cypto and PKI Flashcards

(26 cards)

1
Q

what is cryptography?

A

science of encrypting or hiding information

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

what is differential cryptanalysis

A

compare inplut plaintext to output ciphertext to determine encryption key

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

what is linear cryptanalysis

A

takes plaintext through a simplified cipher to deduce what the encryption key is likely to be

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

why is hashing done

A

to provide intergrity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

why are digital signatures used

A

provide non-repudiation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

different types of data usage?

A

data in transit, data at rest, and data in use

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

what is in a symmetric algorithm

A

a private shared key used to encrypt and decrypt data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

what are the common symmetric algorithms?

A

3DES, AES, Blowfish, twofish, and RC4

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

what is asymmetric algorithms?

A

uses two keys instead of one example is PKI

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

what two keys are used in PKI?

A

private and public key

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

what are some popular asymmetric algorithms?

A

RSA, diffie-hellman, ECC, and ElGamal

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

diffusion

A

form of dispersion in plaintext and ciphertext

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

confusion

A

randomness of output increases entropy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

collison

A

two inputs same hash output

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

ephermal key?

A

used only once after generation keys

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

what data does tls and ssl protect?

A

data in transit

17
Q

what is data at rest encryption example?

A

whole disk encryption

18
Q

cryptographic provider?

A

library that implements cryptographic functions

19
Q

does diffie hellman allow in band or out of band key exchange?

A

in band even if entire data stream is being viewed

20
Q

why is salting used?

A

provide more entropy eliminate problem of identical passwords

21
Q

what modes are the most secure?

A

CBC and CTM/CTR

22
Q

what are two encryption operation modes?

A

block and stream

23
Q

why isn’t asymmetric suitable for bulk encryption?

A

because they are slower than symmetric methods

24
Q

difference between dhe and ecdhe in diffie hellman?

A

ecdhe uses ecc while dhe uses temporary key

25
what is weak in wep?
IV used is sent in plaintext
26
why is wpa2 better than wpa?
it uses aes instead of TKIP