Chapter 10: Understanding Crptography and PKI Flashcards
(109 cards)
What is Integrity?
Ensures data has not been altered or tampered with intentionally or accidentally.
What is a Hash?
A fixed-length output (digest) created from data using a one-way algorithm.
What is Confidentiality?
Ensures that only authorized users can access sensitive data.
What is Encryption?
The process of converting readable data into an unreadable format to protect it.
What is Symmetric Encryption?
An encryption method where the same key encrypts and decrypts data.
What is a Stream Cipher?
Encrypts data one bit or byte at a time.
What is a Block Cipher?
Encrypts data in fixed-size chunks (blocks), usually 64 or 128 bits.
What is Asymmetric Encryption?
Uses a public key to encrypt and a private key to decrypts.
What is Steganography ?
Hides data within other data so it’s not noticeable.
What is Non-repudiation?
Ensures a sender cannot deny having sent a message.
What is Authentication?
Verifies the identity of a user, device, or process.
What is Hashing?
One-way function that coverts data into a fixed-sized string (hash).
What is a Checksum?
A value calculated from a data set to detect errors or changes.
What is Message Digest 5 (MD5)?
A widely used hash function producing a 128-bit hash value.
What is the Secure Hash Algorithm (SHA)?
A family of cryptographic hash functions designed by the NSA.
What is SHA-0?
The original version of SHA, published in 1993 but withdrawn due to flaws.
What is SHA-1?
Produces a 160-bit hash; used in SSL/TLS, but now considered weak.
What is SHA-2?
Includes SHA-224, SHA-256, SHA-384, and SHA-512. Widely used today.
What is SHA-3?
A different structure from SHA-2 and designed for future-proofing in case SHA-2 is broken.
What is the Hash-based Authentication Code (HMAC)?
A hash function combined with a secret key to verify message integrity and authenticity.
What is HMAC-MD5?
HMAC that uses MD5 as the underlying hash function.
What is HMAC-SHA-256?
Combines a message, a secret key, and SHA-256 to ensure data integrity and authenticity.
The hash of a file will always be the same no matter how many times you calculate it using the same hashing algorithm?
This is true.
What if an attacker changes both the message and sends a modified hash?
HMAC protects against this, because the secret key is unknown to the attacker.