Cryptography Concepts Flashcards

1
Q

Integrity protection operations

A

When Materials, Plaintext, needs to be protected from unauthorized interception or alteration, it is encrypted into ciphertext.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
1
Q

Key exchange

A

Key exchange (also known as “key establishment”) is any method in cryptography by which cryptographic keys are exchanged between two parties, allowing use of a cryptographic algorithm.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Steganography

A

Greek steganos, or “covered,” and graphie, or “writing”) is the hiding of a secret message within an ordinary message and the extraction of it at its destination.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

A digital signature

A

is a mathematical technique used to validate the authenticity and integrity of a message, software or digital document.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

A digital certificate

A

is an electronic “passport” that allows a person, computer or organization to exchange information securely over the Internet using the public key infrastructure (PKI).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

A public key infrastructure (PKI)

A

supports the distribution and identification of public encryption keys, enabling users and computers to both securely exchange data over networks such as the internet and verify the identity of the other party.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

A public key certificate

A

is a digitally signed document that serves to validate the sender’s authorization and name.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Crypto Analysis

A

is the process of analyzing available information in an attempt to return the encrypted message to its original form.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Cryptographic process involve

A

algorithms and increasingly complex keys.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

There are two types of cryptanalysis:

A
  • Differential Cryptanalysis
  • Linear Cryptanalysis
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Differential Cryptanalysis

A

is done by comparing the input plaintext to the output ciphertext to try to determine the key used to encrypt the information.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Linear Cryptanalysis

A

is similar in that it uses both plaintext and ciphertext, but it puts the plaintext through a simplified cipher to try to deduce what key is likely to be In the full version of the cipher.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

There are two Major types of key Algorithm (Cryptographic Techniques):

A
  • Symmetric Key Algorithm
  • Asymmetric Key Algorithm
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Symmetric-key algorithms

A

Symmetric-key algorithms are algorithms for cryptography that use the same cryptographic keys for both encryption of plaintext and decryption of ciphertext.

The keys may be identical or there may be a simple transformation to go between the two keys.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Asymmetric Cryptography,

A

Asymmetric cryptograhy, also known as public key cryptography, uses public and private keys to encrypt and decrypt data.

Public-key cryptography, or asymmetric cryptography, is an encryption scheme that uses two mathematically related, but not identical, keys - a public key and a private key. …

The public key is used to encrypt and the private key is used to decrypt.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Hashing Functions

A

Hashing functions are commonly used encryption methods.

A Hash Function is a special mathematical function that performs one-key encryption.

There is no feasible way to generate two different plaintexts that compute to the same hash value.

Common use of hashing algorithms are to store computer password and to ensure message integrity.

16
Q

Cryptography

A

is the science of encrypting, or hiding, information.

According to Shannon, there are two basic approaches to Encryption:
Confusion
Diffusion

17
Q

Confusion

A

Encryption operation where the relationship between
cleartext and ciphertext is obscured.
The key does not relate in a simple way to the ciphertext. In Particular, each character of the ciphertext should depend on several parts of the key.

18
Q

Diffusion

A

Diffusion:- Encryption by spreading out the influence of one
cleartext letter over many ciphertext letters.

                - If we change a character of the plaintext, then several characters of the ciphertext should change, and similarly, if we change a character of the ciphertext, then several characters of the plaintext should change.
19
Q

Non-Repudiation

A

Is a property that deals with the ability to verify that a message has been sent and received so that the sender (or receiver) cannot refute sending (receiving) the information.

20
Q

Key Escrow

A

is a system by which your private key is kept both by you and a third party.

  • provide a method of obtaining a key in the event that the key holder is not available.
  • can solve many problems resulting from an inaccessible key, and the nature of cryptography makes the access of the data impossible without the key.