Cryptography Flashcards
Hide your information! Keep it safe!
Which of the following is NOT a goal of cryptography?
a) Confidentiality
b) Integrity
c) Availability
d) Obscurity
Answer:
d) Obscurity
Explanation:
“Security by obscurity doesn’t work”, implied that it is not a goal of cryptography.
Confidentiality, integrity, and availability are explicitly listed as security goals.
What is the process of transforming a message to hide its meaning?
a) Cryptanalysis
b) Encryption
c) Decryption
d) Steganography
Answer:
b) Encryption
Explanation:
Encryption is defined as “a process of scrambling data so that it can only be read by the intended recipient”.
In cryptography, what is the original message called?
a) Ciphertext
b) Key
c) Plaintext
d) Hash
Answer:
c) Plaintext
Explanation:
“Plaintext – original message”
Which type of cryptography uses the same key for encryption and decryption?
a) Asymmetric key cryptography
b) Symmetric key cryptography
c) Hash functions
d) Public key cryptography
Answer:
b) Symmetric key cryptography
Explanation:
Symmetric key cryptography uses the same key for encryption and decryption.
What is a potential vulnerability of the shift cipher?
a) Large key space
b) Frequency analysis
c) Perfect secrecy
d) Computational security
Answer:
b) Frequency analysis
Explanation:
The shift cipher is a type of mono-alphabetic substitution cipher, and “Substitution ciphers are vulnerable to frequency analysis attacks”.
What is the key characteristic of a One-Time Pad?
a) Key reuse
b) Short key length
c) Key is at least as long as the plaintext
d) Predictable key
Answer:
c) Key is at least as long as the plaintext
Explanation:
Key is a random string that is at least as long as the plaintext.
What is the term for breaking cryptography?
a) Cryptography
b) Cryptanalysis
c) Cryptology
d) Encryption
Answer:
b) Cryptanalysis
Explanation:
Cryptanalysis - Breaking cryptography
Which of the following is NOT a property of stream ciphers?
a) Fast encryption
b) Perfect secrecy
c) Highly malleable
d) Security depends on PRNG
Answer:
b) Perfect secrecy
Explanation:
Stream ciphers does not have perfect secrecy and are highly malleable.
What is a block cipher?
a) Cipher that encrypts one bit at a time
b) Cipher that encrypts blocks of data
c) Cipher that uses a stream of keys
d) Cipher that uses asymmetric keys
Answer:
b) Cipher that encrypts blocks of data
Explanation:
Block ciphers work by rather than encrypting letter by letter, encrypting block by block.
What is the block size of DES?
a) 128 bits
b) 256 bits
c) 64 bits
d) 56 bits
Answer:
c) 64 bits
What is a major vulnerability of DES?
a) Large block size
b) Short key size
c) Complex algorithm
d) Slow encryption speed
Answer:
b) Short key size
Explanation:
DES’s main vulnerability is short key size. Key size is 56 bits, considered insecure now - vulnerable to brute-force attacks.
What is the main goal of AES?
a) Replace RSA
b) Provide perfect secrecy
c) Replace DES
d) Implement asymmetric key cryptography
Answer:
c) Replace DES
Which encryption mode is deterministic?
a) CBC
b) CTR
c) ECB
d) OFB
Answer:
c) ECB
Explanation:
Deterministic: the same data block gets encrypted the same way. This describes ECB mode.
Which mode of operation uses an Initialization Vector (IV)?
a) ECB
b) CTR
c) CBC
d) None of the above
Answer:
c) CBC
Explanation:
DES Encryption Modes: CBC
Which mode of operation gives a stream cipher from a block cipher?
a) ECB
b) CBC
c) CTR
d) CFB
Answer:
c) CTR
Explanation:
Gives a stream cipher from a block cipher
What type of cryptography uses different keys for encryption and decryption?
a) Symmetric key cryptography
b) Asymmetric key cryptography
c) Hash functions
d) Stream ciphers
Answer:
b) Asymmetric key cryptography
Explanation:
Public-key cryptography separates the keys used for encryption and decryption.
Which algorithm is commonly used in public-key cryptography?
a) DES
b) AES
c) RSA
d) RC4
Answer:
c) RSA
Explanation:
Integer factorization (e.g., RSA)
What is a hash function?
a) A function that encrypts data
b) A function that decrypts data
c) A function that maps a message of arbitrary length to a fixed-size output
d) A function that generates keys
Answer:
c) A function that maps a message of arbitrary length to a fixed-size output
What is a key property of a cryptographic hash function?
a) It is reversible
b) It produces variable-length output
c) It is unique to the input data
d) It is used for encryption
Answer:
c) It is unique to the input data
Explanation:
Hash functions create fixed-length codes (hashes) unique to the input data.
What does HMAC provide?
a) Encryption
b) Decryption
c) Message authentication
d) Key generation
Answer:
c) Message authentication
Explanation:
HMAC (Hash-based Message Authentication Code): HMAC is a special type of MAC that uses a cryptographic hash function and a secret cryptographic key.
MAC is a tag or piece of information that authenticates a message.
What are the three goals of information security (CIA)?
Answer:
Confidentiality (secrecy, privacy), Integrity, and Availability.
Explain the difference between a passive and an active attack.
Answer:
A passive attack involves eavesdropping without modifying the data.
An active attack involves modifying the data or the communication channel.
What is steganography?
Answer:
Steganography is “covered writing” and “Hides the existence of a message”.
Define “ciphertext.”
Answer:
Ciphertext is the transformed message.