Chapter 8 - Encryption Flashcards
(34 cards)
What are self-executing contracts?
Contracts with code-defined terms that execute actions automatically when conditions are met.
What are the commercial uses of blockchain?
Companies like IBM promote blockchain for commercial purposes, using permissioned blockchain for business transactions.
How does blockchain enhance trust and transparency?
Through an immutable public ledger that ensures data integrity.
What is the role of blockchain in supply chain management?
Provides transparency and traceability, ensuring compliance and quality control with immutable records.
What is a key feature of blockchain?
Decentralization, which eliminates the need for central authorities.
What does an immutable ledger ensure?
Data integrity, as records cannot be altered or deleted.
What is the digital evolution impact of blockchain?
It reshapes traditional systems, offering transparency, efficiency, and trust in the digital era.
What is a TPM (Trusted Platform Module)?
A dedicated microcontroller for hardware-level security that protects digital secrets.
What is the function of an HSM (Hardware Security Module)?
Safeguards and manages digital keys in a tamper-proof environment.
What does a Key Management System do?
Manages, stores, distributes, and retires cryptographic keys.
What is a secure enclave?
A coprocessor integrated into the main processor for secure data processing and storage.
What is steganography?
A technique that conceals a message within another to hide its existence.
What is tokenization?
The process of substituting sensitive data with non-sensitive tokens.
What is data masking?
The process of disguising original data to protect sensitive information.
What are cryptographic attacks?
Techniques used to exploit vulnerabilities in cryptographic systems.
What is a downgrade attack?
An attack that forces systems to use weaker cryptographic standards.
What is a collision attack?
An attack that finds two different inputs producing the same hash output.
What is the Birthday Paradox in cryptography?
The probability that two distinct inputs will produce the same hash output.
What is quantum computing?
A computing technology that uses quantum mechanics to access enormous processing power.
What are qubits?
Quantum bits that can represent multiple combinations of ones and zeros simultaneously.
What is the threat of quantum computing to traditional encryption?
It poses a threat by enabling rapid factorization of large prime numbers.
What is post-quantum cryptography?
Cryptographic algorithms designed to be secure against quantum computing attacks.
What is one method for creating post-quantum cryptography?
Increasing the key size to raise the number of permutations needed for brute force.
What are the NIST selected post-quantum cryptography standards?
CRYSTALS-Kyber, CRYSTALS-Dilithium, FLACON, SPHINCS+.