Cryptography Flashcards

1
Q

Hashing

A

Hashing algorithms create hexcode strings of a fixed length. The length is determined by the algorithm. Hashing is oneway encryption. Cannot be decrypted. Hash strings are hexadecimal.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is hexadecimal?

A

It is a shorthand for binary (0s and 1s) where each hex character represents a permutation of a group of four 1s and 0s. 0 1 2 3 4 5 6 7 8 9 a b c d e f

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Explain binary

A

Each number is a bit (0 or 1)
8 bits = byte
1024 bytes = kilobyte
1024 kilobytes = megabyte
1024 megabytes = gigabyte
1024 gigabytes = terabyte

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Explain hashing digest

A

A hashing algorithm has a digest, measured in bits as size, which is the hex-code string x 4. The digest is the binary representation of the hex code. Two completely different values could theoretically create the same digest, which is called a collision.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

File and hashing

A

A file can be hashed. This is because a file is 1s and 0s (binary). Everything in computer world is long strings of 1s and 0s.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is the best algorithm for encryption?

A

AES

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Hashing algorithms

A

md5
sha1
sha2
sha-128 (128 bit digest), sha-256 (256 bit digest)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is symmetric encryption?

A

The idea is that an algorithm is used to encrypt and decrypt clear text into cipher text, using a secret key.

The key is converted to binary, and the clear text as well. This is used by the algorithm to create the cipher text. Most current algorithms are BLOCK CIPHER ENCRYPTION where chunks of bits are encrypted by having key as binary+chunk (which is binary), encrypted chunk by chunk and the cipher text is the concatenation of all these cipher text strings for each chunk of data.

Different algorithms use different chunk sizes - like 256 bits or whatever.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly