Chapter 10: Understanding Crptography and PKI Flashcards

(109 cards)

1
Q

What is Integrity?

A

Ensures data has not been altered or tampered with intentionally or accidentally.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is a Hash?

A

A fixed-length output (digest) created from data using a one-way algorithm.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is Confidentiality?

A

Ensures that only authorized users can access sensitive data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is Encryption?

A

The process of converting readable data into an unreadable format to protect it.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is Symmetric Encryption?

A

An encryption method where the same key encrypts and decrypts data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is a Stream Cipher?

A

Encrypts data one bit or byte at a time.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is a Block Cipher?

A

Encrypts data in fixed-size chunks (blocks), usually 64 or 128 bits.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is Asymmetric Encryption?

A

Uses a public key to encrypt and a private key to decrypts.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is Steganography ?

A

Hides data within other data so it’s not noticeable.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is Non-repudiation?

A

Ensures a sender cannot deny having sent a message.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is Authentication?

A

Verifies the identity of a user, device, or process.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is Hashing?

A

One-way function that coverts data into a fixed-sized string (hash).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is a Checksum?

A

A value calculated from a data set to detect errors or changes.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is Message Digest 5 (MD5)?

A

A widely used hash function producing a 128-bit hash value.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is the Secure Hash Algorithm (SHA)?

A

A family of cryptographic hash functions designed by the NSA.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is SHA-0?

A

The original version of SHA, published in 1993 but withdrawn due to flaws.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

What is SHA-1?

A

Produces a 160-bit hash; used in SSL/TLS, but now considered weak.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

What is SHA-2?

A

Includes SHA-224, SHA-256, SHA-384, and SHA-512. Widely used today.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

What is SHA-3?

A

A different structure from SHA-2 and designed for future-proofing in case SHA-2 is broken.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

What is the Hash-based Authentication Code (HMAC)?

A

A hash function combined with a secret key to verify message integrity and authenticity.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

What is HMAC-MD5?

A

HMAC that uses MD5 as the underlying hash function.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

What is HMAC-SHA-256?

A

Combines a message, a secret key, and SHA-256 to ensure data integrity and authenticity.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

The hash of a file will always be the same no matter how many times you calculate it using the same hashing algorithm?

A

This is true.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

What if an attacker changes both the message and sends a modified hash?

A

HMAC protects against this, because the secret key is unknown to the attacker.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
What are Hash Collisions?
When two different inputs product the same hash output.
26
What is an Online Password Attack?
When an attacker tries to log in repeatedly through a live system.
27
What is an Offline Password Attack?
Attacker has access to stolen password hashes and brute-forces them locally.
28
What is a Dictionary Attack?
Attempts passwords from a pre-compiled list of common words and phrases.
29
What is a Brute Force Attack?
Tries every possible combination until the correct one is found.
30
What is a Password Spraying Attack?
Tries a few common passwords against many accounts.
31
What is a Pass the Hash Attack?
Attacker uses a stolen hashed password to authenticate without cracking it.
32
What is a Birthday Attack?
An attack that exploits the probability of hash collisions based on the birthday paradox.
33
What is the Birthday Paradox?
In cryptography, shows that hash collisions are more likely than expected. For an n-bit hash, a collision can occur in about 2^(n/2) attempts, not 2^n. This highlights the need for stronger hash functions to resist collision attacks.
34
What is a Rainbow Table Attack?
Uses a pre-computed table of hashes for common passwords to reverse hashes quickly.
35
What is Salting?
Adding a random string (salt) to each password before hashing.
36
What is Key Stretching?
Strengthens weak passwords by increasing the time it takes to hash them.
37
What is Bcrypt?
A key stretching and salting algorithm for securely hashing passwords.
38
What is PBKDF2?
A key stretching algorithm that strengthens passwords against brute-force attacks by using a password, salt, and multiple iterations to derive a cryptographic key.
39
What is Argon2?
Designed to resist GPU/ASIC attacks by using memory-hard functions.
40
What is the Blowfish block cipher?
A symmetric-key block cipher with a 64-bit block size and a key length up to 448 bits.
41
What is Data at rest?
Data that is stored on a device or backup.
42
What is Data in use?
Data that is actively being processed or accessed.
43
What are the two primary encryption methods?
Symmetric and Asymmetric?
44
What are the two elements in an encryption method?
A key and the algorithm.
45
What is Asymmetric Encryption?
Uses a pair of keys for encryption and decryption: a private key and a public key.
46
What is Symmetric encryption? AKA secret-key encryption and session-key encryption.
Uses one secret key for both encryption and decryption.
47
In regards to encryption algorithms, what is the key?
A secret value used to encrypt and decrypt data.
48
In regards to encryption algorithms, what is the algorithm itself?
The algorithm is the set of rules or procedures that defines how the encryption or decryption happens.
49
What is ROT13?
A simple cipher that rotates each letter by 13 positions in the alphabet.
50
What is Obfuscation?
Makes code or data harder to read or understand. Not true encryption.
51
What are Block Ciphers?
Encrypts data in fixed-sized blocks (e.g. 128 bits at a time).
52
What is the Advanced Encryption Standard (AES)?
Widely used in block ciphers ---fast, secure, and standard.
53
What are Stream Ciphers?
Encrypts data bit-by-bit or byte-by-byte --like a flowing stream. Ideal for real-time use.
54
What are some of the strengths of AES?
It's fast, efficient, and strong.
55
What is the Triple Data Encryption Standard (3DES)?
Applies DES three times for extra security. Nonetheless, considered deprecated. Use AES.
56
What is Blowfish?
A symmetric block cipher with a 64-bit block size and flexible key length.
57
What is Twofish?
Successor to Blowfish, designed to be faster and more secure.
58
What is Key Exchange?
The secure sharing of a key between two parties.
59
What are Certificate Authorities (CA)?
A trusted organization that issues digital certificates to verify identities online.
60
What are Digital Certificates?
A file issued by a CA that confirms the ownership of a public key.
61
What are some common Digital Certificate elements?
Serial number, issuer, validity date, subject, public key, key usage, and certification attributes (CN, O, L, S, C).
62
What does Ephemeral mean?
Short-lived or temporary, used once and then discarded.
63
What is Perfect Forward Secrecy?
A property of secure systems where ephemeral keys are used so that even if one key is compromised, past communications remain secure.
64
What is an Ephemeral Key?
A key for one session only, then discarded.
65
What is Elliptic Curve Cryptographic (ECC)?
Uses elliptic curves to create small but strong encryption keys.
66
Since encryption algorithms do not change, how are they strengthened?
You increase the length of a key.
67
What is Rivest-Shamir-Adleman (RSA)?
A widely-used asymmetric encryption algorithm; often used in digital signatures and secure data transmission.
68
What is Audio Steganography?
Hides data inside audio files by slightly altering sound data.
69
What is Image Steganography?
Hides data in image files, often by changing the least significant bits of pixels.
70
What is Video Steganography?
Embeds data in video files using techniques like altering frames or audio.
71
What is Tokenization?
Replaces sensitive data with random tokens.
72
What is Masking?
Hides parts of sensitive data (e.g. ***-***-2315).
73
What is the Digital Signature Algorithm (DSA)?
An algorithm used to create digital signature; confirms a message's integrity and authenticity.
74
What security benefits are achieved if a recipient can decrypt a digital signature?
Authentication, Non-repudiation, and Integrity.
75
What is the Secure/Multipurpose Internet Mail Extensions (S/MIME)?
A standard for email encryption and digital signing.
76
Are CAs required to support TLS?
Yes.
77
What is a Downgrade Attack?
A cyberattack where a secure connection is forced to use a weaker/older protocol or cipher.
78
What is the Blockchain?
A decentralized, immutable ledger of data (blocks) linked using cryptography.
79
What are Open Public Ledgers?
A blockchain that anyone can read, write to, or audit.
80
In the context of Cybersecurity, what is Entropy?
Randomness or unpredictability in data.
81
In the context of Cybersecurity, what is Predictability?
When an attacker can guess or calculate a value.
82
What are Weak Keys?
A short/small key (low entropy).
83
In the context of Cybersecurity, what is Longevity?
Refers to how long an encryption algorithm or key remains secure.
84
With symmetric encryption, should the same key be reused?
No, it makes the algorithm vulnerable to attack.
85
What is a Plaintext Attack?
An attacker that has access to unencrypted data that tries to find patterns or infer the encryption method to compromise the system.
86
What is a Chosen-Plaintext Attack?
The attacker chooses plaintexts and sees their encrypted outputs, which can help reverse-engineer the encryption algorithm/key.
87
What is a Cipher-only Attack?
The attacker only has access to the ciphertext to analyze for patterns to infer the encryption method to compromise the system.
88
What is Public Key Infrastructure (PKI)?
A framework of people, policies, and technology to manage digital certificates.
89
What are Intermediate CAs?
CAs that site between the root CA and the end-user certificate.
90
What is Certificate Chaining?
A chain of trust from the root CA to the end-user certificate via intermediates.
91
What is OpenSSL?
An open-source toolkit for implementing SSL/TLS encryption.
92
What are Certificate Singing Requests (CSR)?
A request sent to a Certificate Authority (CA) to obtain a digital certificate.
93
What is a Registration Authority (RA)?
A trusted entity that verifies user identities before a certificate is issued.
94
What reasons can a CA revoke a certificate?
Private key compromise, Change of affiliation, Superseded by another certificate, Cease of operation, Certificate hold, or Certificate holder's request.
95
What are common issues with Invalid Certificates?
They're expired, Certificate no longer trusted, Certificate Revoked.
96
What is a Certificate Revocation List (CRL)?
A list of revoked certificates that are no longer trusted.
97
What is the Online Certificate Status Protocol (OCSP)?
A real-time protocol for checking if a certificate is valid or revoked.
98
What is OCSP Stapling?
The server "staples" (includes) the OCSP response from the CA with its certificate during the TLS handshake.
99
What is Certificate Pinning?
A security technique where a client remembers (pins) a server's public key or certificate.
100
What is Key Escrow?
A trusted third-party that holds a copy of encryption keys for legal or recovery purposes.
101
What is a Key Management System (KMS)?
A system used to generate, store, rotate, and destroy encryption keys securely.
102
What are some tasks handled by a KMS?
Key generation, Key storage, Key distribution, Key rotation, and Key retirement/revocation/destruction.
103
What are some Certificate Types?
Machine/computer, User,Email, Code signing, Self-signed, Root, Wildcard, Subject alternative name (SAN), Domain Validation, and Extended Validation.
104
What are the Certificate formats?
Canonical Encoding Rules (CER), Distinguished Encoding Rules (DER), P7B, P12, and Personal Information Exchange (PFX).
105
What is Canonical Encoding Rules (CER)?
A set of strict rules for encoding data in Abstract Syntax Notation One (ASN.1).
106
What is Distinguished Encoding Rules (DER)?
A binary format for data structures described by ASN.1.
107
What is P7B?
Certificate format used to store certificates and certificate chains (but no private keys).
108
What is P12?
A binary format for storing the full package: certificate(s) + private key(s).
109
What is Personal Information Exchange?
Same as P12 -- used interchangeably.