Cryptographic Solutions Flashcards
(75 cards)
What is cryptography?
Practice and study of writing and solving codes
Involves encryption to hide information’s true meaning.
What does encryption do?
Converts plaintext to ciphertext
Provides data protection at rest, in transit, and in use.
Define Data at Rest.
Inactive data on storage devices.
Define Data in Transit.
Data moving across networks.
Define Data in Use.
Data currently undergoing change.
What is an algorithm in the context of cryptography?
A cipher that performs encryption or decryption.
What role does a key play in cryptography?
Essential for determining cipher output.
How is key strength determined?
By key length, which is proportional to security.
What is key rotation?
Best practice for security longevity.
What is symmetric encryption?
Uses the same key for encryption and decryption.
What is asymmetric encryption?
Uses a pair of keys for encryption and decryption.
List examples of symmetric algorithms.
- DES
- Triple DES
- IDEA
- AES
- Blowfish
- Twofish
- Rivest Cipher
List examples of asymmetric algorithms.
- Diffie-Hellman
- RSA
- Elliptic Curve Cryptography
What does hashing do?
Converts data into a fixed-size string (digest) using hash functions.
What are common hashing algorithms?
- MD5
- SHA Family
- RIPEMD
- HMAC
What is Public Key Infrastructure (PKI)?
Framework managing digital keys and certificates for secure data transfer.
What is a digital certificate?
Electronic credentials verifying entity identity for secure communications.
What is blockchain?
Decentralized, immutable ledger ensuring data integrity and transparency.
List encryption tools.
- TPM
- HSM
- Key Management Systems
- Secure Enclave
What is Obfuscation in cryptography?
Techniques to obscure data, including steganography, tokenization, and data masking.
What are common cryptographic attacks?
- Downgrade Attacks
- Collision Attacks
- Quantum Computing Threats
True or False: Symmetric encryption uses different keys for encryption and decryption.
False.
What is a stream cipher?
Encrypts data bit-by-bit or byte-by-byte in a continuous stream.
What is a block cipher?
Breaks input data into fixed-size blocks before encryption.