Cryptography Flashcards

1
Q

the practice of disguising information in a way that looks random

A

Cryptography

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

earliest known and simplest cypher; uses substitution and a decoder ring

A

Caesar Cipher

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

breaking encrypted codes

A

Cryptanalysis

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

employees the Caesar cipher as one element of the encryption process; requires a key

A

Vingenere Cipher

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Classic cryptography components (two)

A

Algorithm and key for encryption

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

encoded and decoded with the same key; The primary way that we encrypt data

A

symmetric encryption

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

sending key with encrypted data

A

in-band

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

sending key without encrypted data

A

out-of-band

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

uses a key pair (public and private)

A

Asymmetric encryption

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

defines key properties, communication requirements for the key exchange and the actions taken through encryption and decryption process

A

Cryptosystem

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Which algorithm is a block cipher, has 64-bit block size, 16 rounds, and a key size of 56 bits?

A

Data Encryption Standard (DES)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Which algorithm has a 64-bit block size and a key size of 32-448 bits?

A

Blowfish

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Which algorithm has a 64-bit block size and a 168 bit key size?

A

Triple DES

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Which algorithm is the U.S. government encryption standard supported by the NIST and has a 128-bit block size and a key size of 128,192,or 256 bits?

A

Advanced Encryption Standard (AES)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What type of algorithm encrypts one bit at a time?

A

Streaming cipher

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

a fixed size input to a cryptographic primitive that is typically required to be random or pseudorandom

A

Initialization vector

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

outputs true only when inputs differ (one is true, zero is false)

A

Exclusive OR (XOR)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

each block of plaintext is XORed with the previous cipher text block before being encrypted; each cipher text block depends on all plaintext blocks processed up to that point. To make each message unique, an initialization vector

A

Cipher Block Chaining (CRB)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

makes a block cipher into self-synchronizing stream cipher. almost identical to CBC performed in reverse

A

Cipher Feedback (CFB)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

makes a block cipher into a synchronous stream cipher; generates keystream blocks, which are XORed with the plaintext blocks to get the cipher text

A

Output Feedback

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

generates the next keystream block by encrypting successive values of a “counter.” The counter can be any function which produces a sequence which is guaranteed not to repeat for a long time, although an actual increment-by-one counter is simplest and most popular.

A

Counter (CTR)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

The message is divided into blocks, and each block encrypted separately.

A

Electronic Codebook (ECB)

23
Q

plain text converted into 16-bit, 64-bit, or 128-bit binary cipher text

A

binary block

24
Q

o Asymmetric cryptographic algorithm
o Based on the fact that finding the factors of a large composite number is difficult: when integers are prime numbers, the problem is called prime factorization

A

RSA Alogrithm

25
An approach to public-key cryptography based on the algebraic structure of elliptic curves over finite fields
Elliptic Curve Cryptography (ECC)
26
o Doesn’t provide encryption, provides a methodology for two parties to come up with the same key o Key agreement (or exchange) protocol o Groups help by defining the size or the structure of the key to use o Can have very large keys
Diffie Hellman
27
Encrypts a message with the public key; the message is decrypted with the private key
Pretty Good Privacy (PGP)
28
Decentralized trust model that Establishes the authenticity between a public key and its owner
web of trust
29
o Provides integrity when it comes to the CIA of security | o Does not encrypt data but it gives it integrity
Hashing
30
128 bit hash invented by Ron Rivest in 1992
Message Digest 5 (MD5)
31
Hash developed by NIS. Has a 160 bit hash, 256 bit hash, 512 bit hash version
Secure Hash Algorithm (SHA)
32
hash algorithm with 128, 160, 256, 320 bit digests
RIPEMD (RACE Integrity Primitives Evaluation Message Digest)
33
occurs when two distinct pieces of data have the same hash value, checksum, fingerprint, or cryptographic digest
Collision
34
Specific type of message authentication code (MAC) involving a cryptographic hash function and a secret cryptographic key
HMAC (hash-based message authentication code)
35
the process of taking data and hiding it in other data
Steganography
36
At minimum, what does a digital certificate contain?
public key, digital signature
37
What can you add to a digital certificate to make it more secure?
A third party digital signature
38
What is a digital certificate that ONLY contains a public key and digital signature called?
Unsigned certificate
39
Hierarchal structure with root servers at the top
Public Key Infrastructure (PKI)
40
What is the structure of a PKI?
Certificate Authority (CA) -- Intermediate Certificate Authority -- users requesting certificates
41
Distributes certificates to intermediate certificate authorities
Root Certificate Systems
42
A group of public-key cryptography standards devised and published by RSA Security LLC.
PKCS (Public Key Cryptography Standards)
43
Standard defining the format of public key certificates
X.509
44
A way to store certificates in individual files
PKCS-7
45
Stores the certificates and the private keys as a package
PKCS-12
46
A list of digital certificates that have been revoked by the issuing certificate authority (CA) before their scheduled expiration date and should no longer by trusted
Certification Revocation list (CRL)
47
An internet protocol used for obtaining the revocation status of an X.509 digital certificate
Online certificate status protocol (OCSP)
48
Uses a text file full of dictionary words to performing a password (hash) attack
dictionary attack
49
A precomputed table for reversing cryptographic hash functions, usually for cracking passwords
rainbow table attack
50
Used to make a possibly weak key, typically a password or passphrase, more secure against a brute-force attack by increasing the resources (time and possibly space) it takes to test each possible key
keystretching technique (PKBDF2)
51
Which part of the cryptography method is publicly available information?
the algorithm
52
What are the two different types of cryptographic methods used for encryption?
symmetric and asymmetric
53
PGP has been used by what service?
mail encryption