Cryptography Flashcards

1
Q

What are the 4 fundamental goals of cryptography?

A
  1. Confidentiality
  2. Integrity
  3. Authentication
  4. Non repudiation
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is a message called before and after it is encrypted?

A

Plaintext & cyphertext

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is the Kerchoff principle?

A

States that a system should be secure even though everything is known.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is FIPS140-2?

A

Federal Information Processing Standard. It is the definition for hardware and software requirements for crypto.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Logical AND

A

Both items need to be true.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Logical OR

A

v

At least one is true

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Logical NOT

A

~

Inverse

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Exclusive OR (XOR)

A

+

Only one needs to be true

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Modulo

A

%

Remainder

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

One way function is…

A

The basis of public crypto systems.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is a nonce?

A

Random number that acts as a placeholder for a variable in a formula.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is the concept of zero knowledge proof?

A

Ability for a third party to prove knowledge of a password without divulging the password.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Split knowledge can also be called…

A

Separation of duties.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is M of N control?

A
M = minimum number of people needed to divulge.
N = Total population of key holders
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is a transposition cipher vs substitution cipher?

A

rearranging letters vs substituting them

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is a polyalphabetic cipher?

A

The use of multiple alphabets to encrypt the data.

17
Q

What is frequency analysis vs period analysis?

A

Studying the frequency of characters to break an encryption mechanism.

18
Q

What must be performed to ensure the integrity of a one time pad?

A
  1. The one time pad must be truly random.
  2. Pad must be kept secret and used once.
  3. Key must be as long as the message.
19
Q

What is a major obstacle of one time pads?

A

They are not scalable.

20
Q

What is a running key cipher?

A

Cipher is from a known string of characters ie a book.

21
Q

What is a block cipher vs a stream cipher?

A

Block operates on a groups of characters at the same time vs stream does one at a time.

22
Q

What is confusion and what is diffusion?

A

Confusion - Complication of relationship between plaintext and ciphertext
Diffusion - One change causes additional downstream changes.

23
Q

What is a symmetric key system and what are its weaknesses

A

Key is shared amongst others.
Weaknesses: key distribution, scalability, no non-repudiation, new keys needed frequently.

Keys needed (n*(n-1))/2

24
Q

What is an asymmetric key system and what are its strengths/ weaknesses?

A

Public/ private key system
Strengths: group changes are less impactful, provided non-repudiation

Weaknesses: slower
Keys needed: n*2

25
What is DES?
Uses a 64bit block. (56 bit key and 8bit checksum)
26
What are the 5 modes of DES?
Electronic Code Book (ECB) - Most basic 64 bit block based. Used for small stuff. Cipher Block Chaining (CBC) - Each block is encrypted with previous block data. Cipher Feedback (CFB) - Encrypts each block as memory fills. Output Feedback Mode (OFB) - Like CEB but data is not encrypted with previous block. Counter Mode (CTR) - like others but seed is from a basic counter.
27
What is triple DES?
Expansion of DES where text is encrypted 3 times. Keys are either 168 or 112 bits.
28
What are the characteristics of Blowfish?
Operates on 64bit blocks and keys can range from 32-448 bits.
29
What are the characteristics of Skipjack?
Operates on 64bit blocks and operates on an 80 bit key and supports key escrow.
30
What are the characteristics of AES/ Rijndael?
Operates on 128 bit blocks with following key strengths: 128bit - 10 rounds of encryption 192bit - 12 rounds of encryption 256bit - 14 rounds of encryption.
31
What is Diffie-Helman?
Method of exchanging keys without both parties meeting.
32
``` What mistake did the Soviets make during the 1940's using a one time cipher? A. Key values not random B. Key values not long enough C. Key values used multiple times D. Key values were disclosed ```
A. Key values not random
33
What is the minimum number of keys in a symmetric system?
One
34
``` What DES operating mode can be used for large messages: A. Cipher Block Chaining (CBC) B. Electronic Codebook (ECB) C. Cipher Feedback (CFB) D. Output Feedback (OFB) ```
D. Output Feedback (OFB)
35
``` Many crypto systems rely on the difficulty of factoring the product of large prime numbers. What characteristic is this? A. Diffusion B. Confusion C. One way function D. Kerchoff ```
C. One way function
36
``` What AES function uses pre & post whitening techniques? A. Rijendael B. Twofish C. Blowfish D. Skipjack ```
B. Two fish