Dion Cryptography - pg86 Flashcards

1
Q

What is cryptogrpahy?

A

A way to hide the true meaning of information.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is encryption?

A

Process of converting ordinary information into an unintelligible form.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is Data at Rest?

A

Inactive data that is stored on a hard drive or other storage device.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is Data in Transit?

A

Data that is moving between devices - on the internet, crossing the network, or data in a computer’s memory.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is Data in Use?

A

Data that is currently being processed - in the CPU.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is ROT13

A

A rotation cypher that moves the letters of the alphabet 13 times.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is plain text?

A

The initial message that has not yet been encrypted.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is ciphertext?

A

The message once it has been encrypted.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is more important when strengthening encryption? The key or the algorithm?

A

The Key!!

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is an encryption key?

A

The essential piece of info that determines the output of a cipher.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is symmetric encryption?

A

Uses an encryption algorithm, where the sender and receives must have the same key.

Confidentiality is assured.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is symmetric encryption also known as?

A

Private Key

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

How can you distribute the key for symmetric encryption?

A

By using asymmetric encryption!

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What are the 9 symmetric algorithms?

A
  1. DES
  2. 3DES
  3. IDEA
  4. AES
  5. Blowfish
  6. Twofish
  7. RC4
  8. RC5
  9. RC6
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is asymmetric encryption?

A

Use two keys - public and private, to encrypt and decrypt data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Name the 3 asymmetric algorithms

A
  1. Diffie-Hellman
  2. RSA
  3. ECC
17
Q

Which is faster - symmetric or Asymmetric? By how much?

A

Symmetric by 100-1000x faster!

18
Q

What is hybrid Implementation?

A

Uses asymmetric encryption to transfer a private key to be used with symmetric encyrption

19
Q

What is a Stream Cipher?

A

Uses a keystream generator to encrypt bit by bit using XOR function to create ciphertext.

20
Q

What is a Block Cipher?

A

Breaks up data into fixed length blocks, which are then encrypted.

Easy to use with software.

21
Q

What is DES?

A

Data Encryption Standard

16 round
64 bit blocks
Uses a 56 bit encryption key

22
Q

What is 3DES?

A

Triple DES

Uses 3 symmetric keys, one after another

23
Q

What is IDEA?

A

International Data Encryption Algorithm

Symmetric Block Cipher
64-bit block

24
Q

What is AES?

What are the 3 bit block lengths that can be used

A

Advanced Encryption Standard
Symmetric Block Cipher

128, 192, 256 bit blocks and MATCHing key size.

Standard for US Gov

25
What is Blowfish?
Symmetric Block Cipher 64 bit block Variable length key Replaced by Twofish!
26
What is Twofish?
Symmetric Block Cipher 128 bit blocks 128, 192, 256 bit keys Replaced blowfish
27
What is RC4?
Rivest Cipher 4 Symmetric STREAM cipher (the only one on the exam!!!) Variable key size from 40 bits to 2048 bits. Used in SSL and WEP
28
What is RC5?
Rivest Cipher 5 Symmetric Block Cipher Key size up to 2040 bits
29
What is RC6?
Rivest Cipher 6 | Symmetric Block Cipher developed to replace DES but AES won!
30
What is asymmetric cryptography also know as? What 4 things does it provide?
Public Key Cryptography - Confidentiality - Integrity - Authentication - Non-repudiation
31
What is a digital signature?
A hash digest of a message encrypted with the sender's private key, which is sent and then decrypted with your public key and checked to see if it is the same.
32
What is PKI?
Public Key Infrastructure
33
What is DH?
Diffie Hellman Algorithm Asymmetric Used to conduct key exchanges Used to establish VPN tunnels using IPSec
34
What is RSA?
Rivest, Shamir and Adleman - Asymmetric - Uses prime numbers - Used widely for key exchange, encryption and digital signatures Key size from 1024 - 4096bits!
35
What is ECC?
Elliptic Curve Cryptography - Asymmetric - Uses algebraic structure of elliptic curves over finite fields to make keys - Used for low-power computing (mobiles)
36
Which ECC key length is the same secure level as an RSA 2048-bit key?
256 bit key!
37
What are the 3 sub types of ECC?
ECDH - Elliptic Curve Diffie-Hellman ECDHE - Elliptic Curve Diffie-Hellman Ephemeral ECDSA - Elliptic Curve Digital Signature Algo