Cryptography Flashcards

1
Q

The practice and study of writing and solving codes in order to hide the
true meaning of information

A

Cryptography

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Process of converting ordinary information (plaintext) into an
unintelligible form (ciphertext)

A

Encryption

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Inactive data that is archived, such as data resident
on a hard disk drive

A

Data at Rest

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Data crossing the network or data that resides in a
computer’s memory

A

Data in Transit

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Data that is undergoing constant change

A

Data in Use

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

The essential piece of information that determines
the output of a cipher

A

Key

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Encryption algorithm in which both the sender and the receiver must
know the same secret using a privately-held key

A

Symmetric Algorithm (Private Key)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

DES, 3DES, IDEA, AES, Blowfish, Twofish, RC4, RC5, RC6

A

Symmetric Algorithm

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Encryption algorithm where different keys are used to encrypt and
decrypt the data

A

Asymmetric Encryption (Public Key)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Utilizes asymmetric encryption to securely transfer a private key that can
then be used with symmetric encryption

A

Hybrid Implementation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Utilizes a keystream generator to encrypt data bit by bit using a
mathematical XOR function to create the ciphertext

A

Stream Cipher

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Breaks the input into fixed-length blocks of data and performs the
encryption on each block

A

Block Cipher

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Encryption algorithm which breaks the input into 64-bit blocks and uses
transposition and substitution to create ciphertext using an effective key
strength of only 56-bits

A

Data Encryption Standard (DES)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Encryption algorithm which uses three separate symmetric keys to
encrypt, decrypt, then encrypt the plaintext into ciphertext in order to
increase the strength of DES

A

Triple DES(3DES)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Symmetric block cipher which uses 64-bit blocks to encrypt plaintext into
ciphertext

A

International Data Encryption Algorithm (IDEA)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Symmetric block cipher that uses 128-bit, 192-bit, or 256-bit blocks and a
matching encryption key size to encrypt plaintext into ciphertext

A

Advanced Encryption Standard (AES)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Symmetric block cipher that uses 64-bit blocks and a variable length
encryption key to encrypt plaintext into ciphertext

A

Blowfish

18
Q

Symmetric block cipher that replaced blowfish and uses 128-bit blocks
and a 128-bit, 192-bit, or 256-bit encryption key to encrypt plaintext into
ciphertext

A

Twofish

19
Q

Symmetric stream cipher using a variable key size from 40-bits to 2048-
bits that is used in SSL and WEP

A

Rivest Cipher (RC4)

20
Q

Symmetric block cipher with a key size up to 2048-bits

A

Rivest Cipher (RC5)

21
Q

Symmetric block cipher that was introduced as a replacement for DES but
AES was chosen instead

A

River Cipher (RC6)

22
Q

A hash digest of a message encrypted with the sender’s private key to let
the recipient know the document was created and sent by the person
claiming to have sent it

A

Digital Signature

23
Q

Diffie-Hellman, RSA, and ECC

A

Asymmetric Algorithm ( private key)

24
Q

Used to conduct key exchanges and secure key distribution over an
unsecured network

A

Diffie Hellman (DH)

25
Q

Asymmetric algorithm that relies on the mathematical difficulty of
factoring large prime numbers
____ is widely used for key exchange, encryption, and digital signatures
____ can use key sizes of 1024-bits to 4096-bits

A

RSA( Rivest, Shamir, and Adleman)

26
Q

Algorithm that is based upon the algebraic structure of elliptic curves
over finite fields to define the keys
§ _____ with a 256-bit key is just as secure as RSA with a 2048-bit key

A

Elliptic Curve Cryptography (ECC)

27
Q

An encryption program used for signing, encrypting, and decrypting
emails

A

Pretty Good Privacy (PGP)

28
Q

A newer and updated version of the PGP encryption suite that uses AES
for its symmetric encryption functions

A

GNU Privacy Guard (GPG)

29
Q

Refers to how an organization will generate, exchange, store, and use
encryption keys

A

Key Management

30
Q

A stream cipher that encrypts plaintext information with a secret random
key that is the same length as the plaintext input

A

One-Time Pad

31
Q

A simulated random number stream generated by a computer that is
used in cryptography, video games, and more

A

Pseudo-Random Number Generator (PRNG)

32
Q

The science and art of hiding messages within other messages

A

Steganography

33
Q

A shared, immutable ledger for recording transactions, tracking assets
and building trust

A

Blockchain

34
Q

A record-keeping system that maintains participants’ identities in secure
and anonymous form, their respective cryptocurrency balances, and a
record book of all the genuine transactions executed between network
participants

A

Public Ledger

35
Q

A computer that uses quantum mechanics to generate and manipulate
quantum bits (qubits) in order to access enormous processing powers

A

Quantum Computing

36
Q

A communications network that relies on qubits made of photons (light)
to send multiple combinations of 1s and 0s simultaneously which results
in tamper resistant and extremely fast communications

A

Quantum Communication

37
Q

A quantum bit composed of electrons or photons that can represent
numerous combinations of 1s and 0s at the same time through
superposition

A

Qubit

38
Q

A new kind of cryptographic algorithm that can be implemented using
today’s classical computers but is also impervious to attacks
from future quantum computers

A

Post-quantum Cryptography

39
Q

A cryptographic key that is generated for each execution of a key
establishment process

A

Ephemeral

40
Q

An encryption method that allows calculations to be performed on data
without decrypting it first

A

Homomorphic Encryption