Chapter 4 - Basic Cryptography Concepts Flashcards

1
Q

What is the practice and study of techniques to secure communication in the presence of third parties?

A

Cryptography

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is the practice and study of determining and exploiting weakness in cryptographic techniques?

A

Cryptanalysis

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Ensuring that only authorized parties can read a message

A

Confidentiality

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Ensuring that any changes to data in transit will be detected and rejected

A

Data Integrity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Ensuring that any messages received were actually sent from the perceived origin

A

Origin Authentication

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Ensuring that the original source of a secured message cannot deny having produced the message

A

Non-repudiation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

An algorithm for performing encryption and decryption

A

Cipher

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

A cipher that substitutes one letter for another and retains the letter frequency of the original message

A

Substitution Cipher

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

A cipher based on substitution that uses multiple substitution alphabets

A

Polyalphabetic cipher

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

A cipher that rearranges or permutates letters

A

Transposition Cipher

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

A cipher also known as a Vernam cipher that is a stream cipher that applies the XOR operation to plaintext with a key

A

One-time pad

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

A mechanism that uses one-way mathematical functions to assure data integrity

A

Hashing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Three most common hash functions

A

MD5, SHA-1, and SHA-2

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

The process of disguising a message in such a way as to hide its original contents

A

Encryption

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

An attack where decryption is attempted using all possible keys

A

Brute-force

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

The effect of changing only a few bits of plaintext causing ciphertext to change completely

A

Avalanche effect

17
Q

Encryption type that uses the same key to encrypt and decrypt data

A

Symmetric encryption algorithm

18
Q

Encryption type that uses different keys to encrypt and decrypt data

A

Asymmetric encryption algorithm

19
Q

The practice of breaking codes to obtain the meaning of encrypted data

A

Cryptanalysis

20
Q

An attack where the attacker has only the ciphertext of messages encrypted using the same algorithm with no knowledge of the hidden plain text

A

Ciphertext-only attack

21
Q

An attack where the attacker has access to the ciphertext of seversal messages, but also knows something about the plain text

A

Known-plaintext attack

22
Q

An attack where the attacker chooses what data the encryption device encrypts and observes the ciphertext output

A

Chosen-plaintext attack

23
Q

An attack where the attacker can choose different ciphertext to be decrypted and has access to the decrypted plaintext

A

Chosen-ciphertext attack

24
Q

A brute-force style attack against hash functions where random input returns one of k equally likely values then by repeating the function with different inputs

A

Birthday attack

25
An attack where the attacker knows a portion of the plaintext and the corresponding ciphertext
Meet-in-the-middle attack
26
Widely used symmetric encryption algorithms
DES, 3DES, AES, RC4
27
Common asymmetric encryption algorithms
RSA, DSA, EIGamal, and elliptic curve algorithms
28
Method that allows two parties to share information over an untrusted network and mutually compute an identical shared secret that cannot be computed by eavesdroppers
Diffie-Hellman key agreement