Cryptographic Solutions Flashcards

(90 cards)

1
Q

Practice & Study of writing & solving codes to hide the true meaning of the information.

A

Cryptography

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Process of converting ordinary information (plain text) into an unintelligible form (cipher text).

A

Encryption

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Inactive data that is being archived.

A

Data at Rest

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Data undergoing a current constant state of change.

A

Data in Use

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Data that moves across the network, resides inside RAM, or moves to & from the processor.

A

Data in Transit

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

An algorithm that performs the encryption or decryption.

A

Cipher

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

A mathematical function (formula) that defines how to encrypt or decrypt something.

A

Algorithm

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Where encryption strength comes from. Its length is proportional to the level of security it provides. The essential piece of information that determines the output of a cipher.

A

The Key

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Use the same key (single key), for both encryption & decryption. Encryption algorithm in which both the sender & the receiver must know the same shared secret using a privately held key.

A

Symmetric Algorithms
(Private Key)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Use a pair of keys, (two), a public key for encryption & a private key for decryption. Encryption algorithm where different keys are used to encrypt & decrypt the data. Does not require a shared secret key, often referred to as public key cryptography since their key is considered to be freely & openly available to the public.

A

Asymmetric Algorithms
(Public Key)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

The practice of hiding secret data within ordinary, non-secret files or messages to avoid detection. Derived from Greek words meaning “covered writing,” and it is all about concealing a message within another so that the very existence of the message is hidden.

A

Steganography

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Process of disguising original data to protect sensitive information while maintaining its authenticity and usability.

A

Data Masking/Data Obfuscation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

A transformative technique in data protection that involves substituting sensitive data elements with non-sensitive equivalents called tokens which have no meaningful value.

A

Tokenization

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Utilizes asymmetric encryption to securely transfer a private key that can then be used with symmetric encryption.

A

Hybrid Implementation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Utilizes a key stream generator to encrypt data bit by bit using a mathematical XOR function to create the ciphertext.

A

Stream Cipher

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Breaks the input into fixed-length blocks of data & performs the encryption on each block.

A

Block Cipher

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Encryption algorithm which breaks the input into 64-bit blocks and uses transposition and substitution to create cipher text using an effective key strength of only 56-bits.

A

Data Encryption Standard (DES) -Symmetric

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Encryption algorithm which uses three separate symmetric keys to encrypt, decrypt, then encrypt the plain text into cipher text in order to increase the strength of DES

A

Triple DES (3DES)
Symmetric

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Symmetric block Cipher, which uses 64-bit blocks to encrypt plain text into cipher text

A

International Data Encryption Algorithm (IDEA)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Symmetric block Cipher that uses 128-bit, 192-bit, or 256-bit blocks & a matching encryption key size to encrypt plain text into cipher text.

A

Advanced Encryption Standard (AES)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Symmetric block Cipher that uses 64-bit blocks & a variable length encryption key to encrypt plain text into cipher text.

A

Blowfish

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

Provides the ability to use 128-bit blocks in its encryption algorithm & uses 128-bit, 192-bit, or 256-bit encryption keys.

A

Twofish

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

Created by Ron Rivest, a cryptographer who’s created six algorithms under the name RC which stands for the Rivest Cipher.

A

RC Cipher Suite

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

Symmetric stream Cipher using a variable key size from 40-bits to 2048-bits that is used in SSL and WEP

A

Rivest Cipher (RC4)
Stream Cipher

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Symmetric block Cipher that uses key sizes up to 2048-bits.
Rivest Cipher (RC5)
26
Symmetric block Cipher that was introduced as a replacement for DES but AES was chosen instead.
Rivest Cipher (RC6)
27
A hash digest of a message encrypted with the sender's private key to let the recipient know the document was created & sent by the person claiming to have sent it. Created by hashing a file & then taking that resulting hash digest & encrypting it with a private key.
Digital Signature
28
Used to conduct key exchanges & secure key distribution over an unsecure network.
Diffie-Hellman (DH)
29
Asymmetric algorithm that relies on the mathematical difficulty of factoring large prime numbers. It can support key sizes between 1024-bits & 4096-bits.
RSA (Rivest, Shamir, & Adleman)
30
Heavily used in mobile devices & it's based on the algebraic structure of elliptical curves over finite fields to define its keys.
Elliptic Curve Cryptography (ECC)
31
ECC version of the popular Diffie-Hellman key exchanges protocol.
Elliptic Curve Diffie-Hellman (ECDH)
32
Uses a different key for each portion of the key establishment process inside the Diffie-Hellman key exchanges.
Elliptic Curve Diffie-Hellman Ephemeral (ECDHE)
33
Used as a public key encryption algorithm by the US Government in their digital signatures.
Elliptic Curve Digital Signature Algorithm (ECDSA)
34
One-way cryptographic function that takes an input & produces a unique message digest as its out put.
Hashing
35
Creates a 128-bit hash value that is unique to the input file.
MD5
36
Creates a 160-bit hash digest, which significantly reduces the number of collisions that occur.
SHA-1
37
Family of hash functions that contain longer hash digests (SHA-224, SHA-256, SHA-384, & SHA-512). Uses 64 to 80 rounds of computations for its message digest.
SHA-2
38
Newer family of hash functions, & its hash digest can go between 224 bits & 512 bits. Uses 120 rounds of computations to create its message digest for each unique file.
SHA-3
39
Comes in 160-bit, 256-bit, and 320-bit versions.
RIPEMD (Race Integrity Primitive Evaluation Message Digest)
40
Open-source hashing algorithm that was created as a competitor to the SHA family.
RIPEMD-160
41
Used to check the integrity of a message & provides some level of assurance that its authenticity is real. It will be paired with other algorithms to do the work.
HMAC (Hash-based Message Authentication Code)
42
Relies upon a 160-bit message digest created by the Digital Security Algorithm.
Digital Security Standard (DSS)
43
Hacking technique that allows the attacker to authenticate to a remote server or service by using the underlying hash of a user's password instead of requiring the associated plain text password.
Pass the Hash Attack
44
Provides the ability to automate the process of harvesting the hashes & conducting the attack.
Mimikatz
45
Occurs when an attacker is able to send two different messages through a hash algorithm & it results in the same identical hash digest, referred to as a collision. The probability that two distinct inputs, when processed through a hashing function, will produce the same output, or a collision.
Birthday Attack
46
If you have a random group of people, the chances are you are going to have two people in that group with the same birthday. The paradox itself posits that in a group of just 23 people, there's a better than 50/50 chance that two of them share the same birthday.
Birthday Paradox
47
Technique that is used to mitigate a weaker key by increasing the time needed to crack it.
Key Stretching
48
Adding random data into a one-way cryptographic hash to help protect against password cracking techniques.
Salting
49
When an attacker tries every word from a predefined list.
Dictionary Attack
50
When an attacker tries every possible password combination.
Brute-force Attack
51
Pre-computed tables for reversing cryptographic hash functions.
Rainbow Tables
52
Stands for "number used once", is a unique, often random number that is added to a password-based authentication process.
Nonce
53
An entire system of hardware, software, policies, procedures, & people that is based on asymmetric encryption. The system that creates the asymmetrical key pairs that consist of those public & private keys that are used in the encryption & decryption process. Framework for managing digital keys & certificates that facilitate secure data transfer, authentication, & encrypted communications over networks.
Public Key Infrastructure (PKI)
54
This encryption & decryption process is just one small part of the overall PKI architecture.
Public Key Cryptography
55
Issues digital certificates & keeps the level of trust between all of the certificate authorities around the world.
Certificate Authority
56
Process where cryptographic keys are stored in a secure, third-party location, which is effectively an "escrow".
Key Escrow
57
Asymmetric encryption and decryption.
Public Key Encryption
58
Digitally signed electronic document that binds a public key with a user's identity.
Digital Certificate
59
Allows all of the subdomains to use the same public key certificate and have it displayed as valid.
Wildcard Certificate
60
Certificate that specifies what additional domains & IP addresses are going to be supported.
Subject Alternate Name (SAN) Field
61
Only requires the server to be validated.
Single-Sided Certificate
62
Requires both the server & the user to be validated.
Dual-Sided Certificate
63
Digital Certificate that is signed by the same entity whose identity it certifies.
Self-Signed Certificate
64
Digital Certificate issued & signed by a trusted certificate authority (CA)
Third-Party Certificate
65
Each certificate is validated using the concept of a root of trust or the chain of trust.
Root of Trust
66
Trusted third party who is going to issue these digital certificates.
Certificate Authority
67
A request for identifying information from the user & forwards that certificate request up to the certificate authority to create the digital certificate.
Registration Authority
68
A block of encoded text that contains information about the entity requesting the certificate.
Certificate Signing Request
69
Servers as an online list of digital certificates that the certificate authority has already revoked.
Certificate Revocation List
70
Allows to determine the revocation status of any digital certificate using its serial number. An alternative to the Certificate Revocation List.
Online Certificate Status Protocol (OCSP)
71
Allows the certificate holder to get the OCSP record from the server at regular intervals.
OCSP Stapling
72
Allows an HTTPS website to resist impersonation attacks from users who are trying to present fraudulent certificates.
Public Key Pinning
73
Occurs when a secure copy of a user's private key is being held.
Key Escrow
74
Specialized type of software that allows the restoration of a lost or corrupted key to be performed.
Key Recovery Agent
75
A shared immutable ledger for recording transactions, tracking assets, and building trust. A really long series of information with each block containing information. Each block also contains the hash for the block before it.
Blockchain
76
A record-keeping system that maintains participants' identities in a secure & anonymous format.
Public Ledger
77
Self-executing contracts where the terms of agreement or conditions are written directly into lines of code. The decentralized & transparent nature of the Blockchain ensures that once it's deployed, it cannot be altered, making the agreement tamper-proof & trustworthy.
Smart Contracts
78
Used for business transactions & it promotes new levels of trust & transparency using this immutable public ledgers.
Permissioned Blockchain
79
Dedicated micro-controller designed to secure hardware through integrated cryptographic keys.
Trusted Platform Module (TPM)
80
Physical device that safeguards and manages digital keys, primarily used for mission-critical situations like financial transactions. Not only does it securely generate cryptographic keys, but it also provides accelerated cryptographic operations.
Hardware Security Module (HSM)
81
Integrated approach for generating, distributing, & managing cryptographic keys for devices & applications. Creation to destruction.
Key Management System
82
Co-processor integrated into the main processor of some devices, designed with the sole purpose of ensuring data protection. By keeping this data separate from the main processor, even if a device gets compromised, the data within it remains untouched.
Secure Enclave
83
Used to protect data by ensuring that it remains recognizable but does not actually include sensitive information. Prevalent in industries that handle vast amounts of personal data.
Data Masking
84
Techniques & strategies that adversaries employ to exploit vulnerabilities in cryptographic systems with the intent to compromise the confidentiality, integrity, or authenticity of data.
Cryptographic Attacks
85
Aims to force a system into using a weaker or older cryptographic standard or protocol than what it's currently utilizing.
Downgrade Attack
86
Aims to find two different inputs that produce the same hash output.
Collision Attack
87
A computer that uses quantum mechanics to generate & manipulate quantum bits (qubits) in order to access enormous processing powers.
Quantum Computing
88
A communications network that relies on qubits made of photons (light) to send multiple combinations of ones & zeros simultaneously which results in tamper resistant & extremely fast communications.
Quantum Communication
89
A quantum bit composed of electrons or photons that can represent numerous combinations of ones & zeros at the same time through superposition.
Qubit
90
A new kind of cryptographic algorithm that can be implemented using today's classical computers but is also impervious to attacks from future quantum computers.
Post-quantum Cryptography