Chapter 10 Flashcards

1
Q

What is MD5?

A

Message Digest 5 is a common hashing algorithm that produces a 128-bithash.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is SHA?

A

Secure Hash Algorithm is either 160 or 256 hash.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is HMAC?

A

Hash-based Message Authentication code is a fixed-length string of bits similar to other hashing algorithms such as MD5 and SHA-1. Uses shared secret key to add some randomness to the result and only the sender and receiver know the secret key.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is RIPEMD?

A

RACE Integrity Primitives Evaluation Message Digest is another hash function used for integrity, though it isn’t as widely used.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is key stretching?

A

It is a technique used to increase the strength of stored passwords and can help thwart brute force and rainbow table attacks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is Bcrypt?

A

Blowfish block cipher and is used on many UNIX and LINUX to protect passwords stored in shadow password file.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What are the key stretching techniques and what do they prevent?

A

Bcrypt and PBKDF2 are key stretching techniques that help prevent brute force and rainbow table attacks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What does data-at-rest refer to?

A

Any data stored on media and it’s common to encrypt sensitive data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What does data-in-transit refer to?

A

Any data sent over a network and it’s common to encrypt sensitive data-in-transit.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What does data-in-use refer to?

A

Data being used by a computer. The computer needs to process data, it is not encrypted while in use.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What are the two primary encryption methods?

A

Symmetric and asymmetric.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is symmetric encryption?

A

Encrypts and decrypts data with the same key.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is asymmetric encryption?

A

Encrypts and decrypts data using a matched key pair of a public and private key,

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is random and pseudo-random numbers?

A

Numbers that appear to be random but is not because of a deterministic algorithm.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is IV

A

Initialization vector provides a starting value for a cryptographic algorithm. It is a fixed size random or pseudo-random number.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is nonce?

A

Nonce is a number used once.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

What is XOR?

A

Logical operation used in some encryption schemes.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

What is confusion?

A

Cipher-text is significantly different than the plaintext.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

What is diffusion?

A

Effective diffusion ensure that small changes in plaintext result in large changes in ciphertext.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

What is a secret algorithm?

A

Private algorithms.

21
Q

What is high resiliency?

A

Security of an encryption key even if an attacker discovers part of the key.

22
Q

What is a block cipher?

A

Encrypts data in specific-sized blocks such as 64 bit blocks or 128 bit blocks.

23
Q

What is stream cipher?

A

Encrypts data as a stream of bits or bytes rather than dividing it into blocks.

24
Q

What is electronic codebook (ECB)?

A

Simplest cipher mode; divide plaintext into blocks and then encrypt each block using the same key.

25
Q

What is Cipher Block Chaining (CBC)?

A

Uses IV for randomization when encrypting the first block. It combines each subsequent block with the previous lock using an XOR operation. Suffers from pipeline delays making it less efficient.

26
Q

What is CTM?

A

Counter mode converts a block cipher into a stream cipher. It combines IV with a counter and uses the result to encrypt each plaintext block.

27
Q

What is GCM?

A

Galois/ Counter mode combines counter mode of operation with Galois authentication. It includes hashing techniques for integrity.

28
Q

What does symmetric encryption use to encrypt and decrypt data?

A

Same key.

29
Q

What is substitution cipher?

A

Replaces plaintext with cipher-text using a fixed system.

30
Q

What is ROT13?

A

Cipher uses the same substitution algorithm but always uses a key of 13. Rotate each letter 13 spaces. It is a method of obfuscation.

31
Q

What is AES?

A

Advanced Encryption Standard (AES) is a strong symmetric block cipher that encrypts data in 128 bit blocks. The size of the key for any encryption directly corresponds to the key strength.
AES is fast, efficient, and strong

32
Q

What is DES?

A

Data Encryption Standard is a symmetric block cipher that was widely used. Encrypts data in 64 bit blocks. It uses a key of 56 bits which can be cracked through brute force.

33
Q

What is 3DES?

A

Symmetric block cipher designed as an improvement over the known weaknesses of DES. Encrypts data using DES algorithm in three separate passes and uses multiple key.
Encrypts data in 64-bit blocks.

34
Q

What is RC4?

A

Symmetric stream cipher and can use between 40 and 2048 bits.

35
Q

What is blowfish?

A

Strong symmetric block cipher that is still widely used. It encrypts data in 64-bit blocks and supports key sizes between 32 and 448 bits.

36
Q

What is twofish?

A

Encrypts data in 128 bit blocks and it supports 128-, 192-, or 256-bit keys.

37
Q

Would you use encryption algorithms to hash data?

A

No because encryption algorithms do not hash.

38
Q

What is RSA?

A

Rivest, Shamir, and Adleman is an asymmetric encryption method using both a public key and a private key in a matched pair.

39
Q

What is ephemeral key?

A

Key that is recreated for each session.

40
Q

What is perfect forward secrecy?

A

Cryptographic system generates random public kets for each session and it doesn’t use a deterministic algorithm.

41
Q

What is elliptic curve cryptography?

A

ECC doesn’t take as much processing power as other cryptographic methods.
Use cases of low-power devices.
Uses mathematical equations to formulate an elliptical curve.

42
Q

What is Diffie-Hellman?

A

DH is a key exchange algorithm used to privately share a symmetric key between two parties. Once the two parties know the symmetric key, they use symmetric encryption to encrypt the data.

43
Q

What is Diffie-Hellman Ephemeral?

A

DHE uses ephemeral keys, generating different keys for each session.

44
Q

What is Elliptic Curve Diffie-Hellman Ephemeral?

A

ECDHE uses ephemeral keys generated using ECC.

45
Q

What is steganography?

A

Hides data inside other data in plain sight.

  • Hide data by manipulating bits
  • Hide data in the white space of a file.
46
Q

What is crypto module?

A

Set of hardware, software, and/or, firmware that implements cryptographic functions.

47
Q

What is public key pinning?

A

Security mechanism designed to prevent attackers form impersonating a web site using fraudulent certificates.

48
Q

What is key escrow?

A

It is the process of placing a copy of a private key in a safe environment. It is useful for recovery.