crypotgraphy Flashcards

(17 cards)

1
Q

What is the importance of cryptography in digital security?

A

Cryptography is fundamental to digital security, similar to how locks are essential to physical security. However, it is not sufficient on its own and must be used correctly within a secure system.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What are the two golden rules for using cryptography?

A
  1. Do not invent your own cryptographic algorithms. 2. Avoid implementing your own cryptographic systems unless absolutely necessary, due to high risk of critical bugs.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What caused the Heartbleed vulnerability?

A

A missing bounds check in OpenSSL’s TLS heartbeat extension allowed attackers to read up to 64KB of server memory, potentially leaking private keys, passwords, and sensitive data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is the principle of Kerckhoff and why is it important?

A

Kerckhoff’s principle states that a cryptosystem should remain secure even if everything about the system, except the key, is public knowledge. Keeping keys secret is essential.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is the idea behind zk-SNARKs used in Zcash?

A

Zero-knowledge Succinct Non-Interactive Arguments of Knowledge allow a user to prove possession of information without revealing it, enabling privacy-preserving cryptocurrency transactions.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What flaw was discovered in Zcash’s implementation of zk-SNARKs?

A

A 2018 flaw allowed computation of the master secret using publicly available logs, raising ethical concerns about disclosing vulnerabilities in deployed systems.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What happened with SIDH and SIKE in post-quantum cryptography?

A

Though once promising, SIDH/SIKE was broken in 2022 by researchers using advanced elliptic curve theory, showing the risk of relying on obscure mathematics.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is the Diffie–Hellman key exchange method?

A

A key agreement protocol where two parties exchange values raised to secret powers modulo a large prime, arriving at a shared secret key, relying on the Discrete Logarithm Problem.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is RSA and how does it work?

A

RSA uses two large prime numbers to create a public/private key pair. Encryption is done using the public key, and decryption with the private key. It also supports digital signatures.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What are digital signatures and how are they used?

A

A digital signature proves authenticity of a message. The sender signs a hash of the message using their private key; the recipient verifies it with the sender’s public key.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is a symmetric key cipher and what are its key properties?

A

A cipher using the same key for encryption and decryption. Key properties include resistance to plaintext and ciphertext attacks, and non-malleability.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is a Man-in-the-Middle attack in cryptography?

A

An attacker intercepts and relays messages between two parties in a key exchange, making each believe they are communicating directly, compromising secrecy.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is Meet-in-the-Middle attack?

A

An attack where encryption is composed of two layers. The attacker computes all outputs from the first layer and compares them with decryptions from the second, reducing complexity.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is AES and how does it improve upon DES?

A

AES supports larger block and key sizes (128, 192, 256 bits) and is more secure than DES, which was eventually broken due to its short 56-bit key.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What makes hash functions cryptographically secure?

A

They are collision-resistant, pre-image resistant, and second pre-image resistant, making it hard to find different inputs that produce the same output.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Why are MD5 and SHA-1 no longer considered secure?

A

Both have known collisions. SHA-1 has been officially deprecated, and collisions can now be computed with moderate resources, making them unsafe for digital signatures.

17
Q

What are cryptographically secure pseudo-random number generators (CSPRNGs)?

A

CSPRNGs produce unpredictable sequences. They resist forward prediction and backward reconstruction even if part of the internal state is known.