Cryptographic Solutions Flashcards

1
Q

Symmetric Algorithm

A

Encryption algorithm in which both the sender and the receiver must know the same shared secret using a privately held key.

Private Key

Single Key

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Asymmetric Algorithm

A

Encryption algorithm where different keys are used to encrypt and decrypt the data

Most common examples are Diffie-Hellman, RSA, and Elliptic Curve Cryptography (ECC)

Public Key

2 Different Keys

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Stream Cipher

A

Utilizes keystream generator to encrypt data bit by bit using a mathematical XOR function to create ciphertext

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Block Cipher

A

Breaks the input into fixed-length blocks of data and performs the encryption on each block

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Data Encryption Standard (DES)

A

Symmetric Algorithm

Encryption algorithm which breaks the input into 64-bit blocks and uses transposition and substitution to create ciphertext using effective key strength of only 56 bits.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Triple DES (3DES)

A

Symmetric Algorithm

The encryption algorithm uses three separate symmetric keys to encrypt, decrypt, and then encrypt the plaintext into ciphertext to increase the strength of DES.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

International Data Encryption Algorithm (IDEA)

A

Symmetric Algorithm

Symmetric Block Cipher uses 64-bit blocks to encrypt plaintext into ciphertext.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Advanced Encryption Standard (AES)

A

Symmetric Algorithm

Symmetric block cipher that uses 128-bit, 192-bit, or 256-bit blocks and a matching encryption key size to encrypt plaintext into ciphertext.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Blowfish

A

Symmetric Algorithm

Symmetric block cipher uses 64-bit blocks and a variable-length encryption key to encrypt plaintext into cipher.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Twofish

A

Symmetric Algorithm

It provides the ability to use 128-bit blocks in its encryption algorithm and uses 128-bit, 192-bit, or 256-bit encryption.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

RC Cipher Suite

A

Symmetric Algorithms

It was created by Ron Rivest, a cryptographer who’s created six algorithms under the name “RC,” which stands for The Rivest Cipher.

RC4 - Symmetric stream cipher using a variable key size from 40 bits to 2048 bits that is used in SSL and WEP.

RC5 - Symmetric block cipher that uses key sizes up to 2048 bits.

RC6 - Symmetric block cipher that was introduced as a replacement for DES but AES was the chosen instead.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Diffie-Hellman (DH)

A

Asymmetric Algorithm

Used to conduct key exchanges and secure key distribution over an unsecured network.
Used for key exchange inside of creating a VPN tunnel establishment as part of IPSec.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

RSA (Rivest, Shamir, and Adleman)

A

Asymmetric algorithm that relies on the mathematical difficulty of factoring large prime numbers.

Can support key sizes between 1024 bites and 4096 bits.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Elliptic Curve Cryptography (ECC)

A

Asymmetric Algorithm

Heavily used in mobile devices and it’s based on the algebraic structure of elliptical curves over finite fields to define its keys.

ECC with a 256-bit key is just as secure as RSA with a 2048-bit key.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Hashing

A

A one-way cryptographic function that takes an input and produces a unique message digest as its output.
The hash digest is always the same length.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

MD5

A

Creates a 128-bit hash value that is unique to the input value

17
Q

SHA-1

A

Creates a 160-bit hash digest, which significantly reduces the number of collisions that occur

18
Q

SHA-2

A

Family of has functions that contain longer hash digests.

19
Q

SHA-3

A

A newer family of hash functions, and its hash digest can go between 224 and 512 bits.

20
Q

RIPEMD (Race Integrity Primitive Evaluation Message Digest)

A

Comes in 160-bit and 320-bit versions

21
Q

RIPEMD-160

A

Open-source hashing algorithm that was created as a competitor to the SHA family.

22
Q

HAMC (Hash-Based Message Authentication Code)

A

Used to check the integrity of a message and provide some level of assurance that its authenticity is real

23
Q

Digital Security Standard (DSS)

A

Relies on a 160-bit message created by the digital security algorithm

24
Q

Pass-the-Hash Attack

A

A hacking technique that allows the attacker to authenticate to a remote server or service by using the underlying has of a user’s password instead of requiring the associated plaintext password.

25
Q

Mimikatz

A

Provides the ability to automate the process of harvesting the hashes and conducting the attack

26
Q

Birthday Attack

A

It occurs when an attacker is able to send two different messages through a has algorithm, and it results in the same identical has digest, referred to as a collision.

27
Q

Birthday Paradox

A

“If you have a random group of people, the chances are you are going to have two people in that group with the same birthday.”

28
Q

Key Stretching

A

A technique that is used to mitigate a weaker key by increasing the time needed to crack it.

29
Q

Salting

A

Adding random data into a one-way cryptographic has to help protect against password cracking techniques.

30
Q

Dictionary Attack

A

When an attacker tries every word from a predefined list.

31
Q

Brute-Force Attack

A

When an attacker tries every possible password combination.

32
Q

Rainbow Tables

A

Precomputed tables for reversing cryptographic hash functions.

33
Q

Nonce

A

Stands for “Number Used Once” is a unique, often random number that is added to the password-based authentication process.

34
Q

Steganography

A

Concealing a message within another so that the very existence of the message is hidden.

The primary goal isn’t just to prevent unauthorized access to the data, but to prevent the suspicion that there’s any hidden data at all.

Frequently used alongside encryption for an extra layer of security.

35
Q

Tokenization

A

Transformative technique in data protection that involves substituting sensitive data elements with non-sensitive equivalents, called tokens, which have no meaningful value.

36
Q

Data Masking

A

It is used to protect data by ensuring that it remains recognizable but does not actually include sensitive info.

Prevalent in industries that handle vast amounts of PII.

37
Q

Downgrade Attack

A

It aims to force a system into using a weaker or older cryptographic standard or protocol than it currently utilizes.

38
Q

Collision Attack

A

It aims to find two different inputs that produce the same hash output.

Collisions can allow malicious actors to impersonate trusted entities, forge digital signatures, or distribute tampered data while appearing genuine.