Cryptography Flashcards

1
Q

What are different type of ciphers?

A

-

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Tell something about block cipher

A

-

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Tell something about stream cipher

A

-

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

How many bits of data is there in DES and how many bits of key is there?

A

64 bits data and 56 bit key, block

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

unclassified material of US government agencies

A

-

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What type of algorithm does AES use

A

symetric key, iterated block chiper

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Block size and key size of AES ?

A

128 bit block, 128, 192 and 256

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

RC4

A

variable key size symetric key stream chiper with byte oriented operations and is based on use of random permutation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

RC5

A

Parametric algorithm with variable block size, variable key size and a variable number of rounds the key size is 128 bits

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

RC6

A

Symmetric key block cipher derived from RC5 with two additional features: uses integer multiplication, four 4-bit working registers RC5 uses 2 2-bit

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Twofish

A

Final list to replace DES for government but was not chosen
block size of 128 key size upto 256 bit
Feistel cipher

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Feistel cipher

A

two fish

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

DSA

A

FIPS 186-2 specifies generation in verification of digital signature

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

RSA

A

Rivest, Shamir, Adleman

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

which is the defacto encryption standard ?

A

RSA. Modular and elementary number theories to perform useinf two large integers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Diffie- Hellman

A

1) a cryptographic protocol that allows two parties to establish a shared key over an insecure channel
2) whitefield Diffie and Martin Hellman in 1976
3) Malcolm J Williamson of british intelligence service but it was classified

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

two parameters p and g

A

Diffie Hellman

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Message Digest

A

Calculate unique fix size bit string

If any given bit of functions input is changed then every output bit has a 50% chance of changing

It is computationally in feasible to have two files with same message digest values

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

MD5

A

Arbitrary length, 128 bit fingerprint.
Not collision resistant, better use SHA-two and SHA-three

20
Q

SHA - 1

A

full form, SHA-1 160-bit digest, (264-1) bits, resembles MD5

21
Q

SHA-2

A

It is a family of two similar hash functions with different block sizes. SHA 256 that uses 32 bit words and SHA 512 that uses 64-bit words.

22
Q

SHA-3

A

Uses sponge construction in which message blocks are XORED into the initial bits of the state which is then invertiblely permuted.

23
Q

RIPMD-160

A

RACE integrity primitives evaluation message digest 160-bit hash algorithm
128,256,320 variants there.
-> 80 stages madeup of 5 blocks that execute 16 times each
repeats twice

24
Q

HMAC full form and from which types of attacks it protects ?

A

message authentication code, length extension attacks

25
Q

Whats PKI and whats it used for ?

A

Public key infrastructure is a security architecture develop to increase the confidentiality of information exchanged over the insecure internet. It includes hardware software people policies and procedures required to create manage distribute use store and revoke digital certificates in cryptography the PKI helps to bind public keys with corresponding user identities by means of certificate authority

26
Q

Components of PKI

A

Certificate management system
Digital certificates
Validation authority VA
Certificate Authority CA
End user
Registration authority RA

27
Q

difference between signed certificate vs self signed certificate

A

CA, public key VA etc. invilbed in sign certificate.
Self signed its private key exchange.

28
Q

Digital Signature

A

Digital signature use uses a symmetric crypto Graffi to simulate the security properties of a signature in digital rather than written form

SIGN->SEAL-DELIVER ACCEPT->OPEN-VERIFY

29
Q

SSL

A

SSL is an application layer protocol developed by Netscape for managing the security of a message transmission on the internet

It uses RSA asymmetric encryption to encrypt data transfer over SSL connections

30
Q

TLS

A
31
Q

CryptaAnalysis Methods

A
32
Q

Code breaking methodologies

A
33
Q

Cryptography attacks

A
34
Q

Cryptography attacks (cont’d)

A
35
Q

Brute force attack

A
36
Q

Birthday Attack

A
37
Q

Side Channel Attack

A
38
Q

Hash Collision Attack

A
39
Q

DUHK attack

A
40
Q

Rainbow table attack

A
41
Q

cryptanalysis tools

A

dds

42
Q

how to defend against cryptographic attacks

A
43
Q

Digital certificates -> master sheet

A

44
Q

full disk encryption -> MS

A

45
Q

Heartbleed, freak, poodle and drown -> MS

A

-

46
Q
A