Chapter 6 Flashcards

(23 cards)

1
Q

When developing a cryptographic system, what are the 3 different types of data:

A

At rest
Data in motion
Data in use - (active memory)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Message Integrity is enforced through the use of encrypted message _____, known as ____ ____

A

Message Integrity is enforced through the use of encrypted message DIGESTS, known as DIGITAL SIGNATURES

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

In authentication, name of the technique to ensure that Bob is who he claims to be

A

Challenge-response

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is the key space?

A

Is the range of values that are valid for use as a key for a specific algorithm.
Set of all possible permutation for a key

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Bit size

A

Number of binary bits (0s and 1s) in the key

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Kerckhoffs principle

A

Concept about encryption to keep algorithms known and public

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Difference between cryptography and cryptanalysis

A

cryptography - art of creating secret codes and cipher

cryptanalyis - the study of methods to defeat codes and ciphers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

AND simbol:

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

OR simbol:

A

v

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is Exclusive OR (XOR)? When XOR is true?

A

It’s TRUE only when ONLY ONE of the input is true
0 x 1 = 1
1 x 0 = 1

0 x 0 FALSE
1 X 1 TRUE

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

NONCE definition

A

randon number generated at the moment of processing for one-time use

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Zero Knowledge proof

A

Cryptography mechanism to prove your knowledge of a fact to a third party without the revealing the fact itself to that third party.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

WHen usually “zero knowledge proof” is usually applied?

A

Passwords and other secret authentications

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Split knowledge definition

A

WHen the information or privilege required to perform an operation is divided among multiple users.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Work Function - Definition in cryptography

A

It’s a measure of the strenght. It’s how long a password takes to be brute-forced. The size of the work functions should be matched against the relative value of the protected asset.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Difference among “code” and “cipher”

A

Code is a way to represent words or phrases, sometimes secret but they are NOT necessarily meant to provide CONFIDENTIALITY

Cipher is MEANT to PROVIDE CONFIDENTIALITY

17
Q

Transposition Ciphers, what does that do?

A

Rearrange the letters of a plaintext message

18
Q

Substitution Ciphers how does it work?

A

Replacing each character or bit of the plaintext message with a different character

19
Q

Polyalphabetic substitution ciphers how does it work

A

Provide multiple alphabets in the same message to hinder decryption efforts

20
Q

Polyalphabetic substitution protects against _____ _______ analysis, but it is vulnerable to a second-order form of frequency analysis called _______ analysis

A

Polyalphabetic substitution protects against DIRECT FREQUENCY analysis, but it is vulnerable to a second-order form of frequency analysis called PERIOD analysis

21
Q

HOw does One-Time Pads works?

A

it uses a different substitution alphabet for each letter of the plain text message.

22
Q

what are the 4 requirements to ensure the integrity of the One-TIme pad algorithm?

A
The pad must be randomly generated
it has to be 
Physically protected against disclosure
Must be used only once
Key at least as long as the message to be encrypted
23
Q

Running Key Ciphers definition

A

Also known as “Common book”. The encryption key is as long as the message itself and is often chosen from a common book`