Domain 3 - Security Architecture and Engineering (Cryptography) Flashcards

1
Q

What is the Purple Machine?

A

It’s the Japanese version of the Enigma which they used during WW2

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is the Scytale Cipher?

A

Used by the Spartans, it would be a message written on paper that needs to be wrapped around a specific width of a rod to make sense.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is the Vigenere Cipher?

A

Uses a grid. Key must be as long as the message. Match row of plaintext with column of key to encrypt.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What are the four goals of Cryptography?

A

Confidentiality, Integrity, Authentication and Nonrepudiation.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What are Symmetric Cryptosystems?

A

Use a shared secret key available to all users of the cryptosystem.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What are Asymmetric Cryptosystems?

A

Use individual combinations of public and private keys for each user.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Which Cryptosystem does not provide nonrepudiation?

A

Symmetric.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is the Key Space of an Algorithm?

A

How many unique keys are possible (determined by it’s Bit Space).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is a Bit Space of an Algorithm?

A

The number of bits within a key (128-bit etc). A bit referring to a single binary number.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is the Kerchoff Principle?

A

Cryptographic systems should be secure, even if everything about how the system works is know.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What are Cryptovariables?

A

Another word for Cryptographic Keys.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Explain the AND operation

A

The AND operation checks to see whether two values are both true. 1 ^ 1 = 1

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is the symbol for the AND operation?

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What operation does this symbol represent (^)?

A

AND

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Explain the OR operation

A

The OR operation checks to see whether at least one of the input values are true.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Explain the NOT operation

A

The NOT operation reverses the value of an input variable.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

What is the symbol for the NOT operation?

A

~ or !

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

What does the Modulo Function do?

A

Wraps around like with a ceaser cipher

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

What is a Nonce?

A

A nonce is a random number that acts as a placeholder variable (an IV is an example)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

What does Zero-Knowledge proof mean?

A

Prove your knowledge of a fact to a third party without revealing the fact itself.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

What does Split Knowledge mean?

A

The separation of duties and two-person control contained in a single solution is called Split Knowledge.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

What is a Work Function?

A

You can measure the strength of a cryptographic system by measuring the effort in terms of computing power to crack a cipher.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

What is the difference between a Code and a Cipher?

A

Code can be public knowledge like 10-4

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

What is a Transposition Cipher?

A

Transposition Ciphers use an encryption algorithm to rearrange the letters of a plaintext message, forming the ciphertext message.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
What is Columnar Transposition?
*FIND DEFINITION*
26
What are Polyalphabetic substitution ciphers?
Polyalphabetic substitution ciphers use multiple alphabets in the same message to hinder decryption efforts
27
What does Polyalphabetic Substitution ciphers protect against?
Frequency Analysis
28
What is a Vernam Cipher?
A one-time pad.
29
What are One Time Pads also called?
Vernam Ciphers.
30
What is a Running Key cipher?
It's using a commonly available book for one time pad messages
31
What are Running Key Ciphers also known as?
Book Ciphers
32
What are Book Ciphers also known as?
Running Key Ciphers.
33
What is a Block Cipher?
Block Ciphers operate on chunks of a message and apply the encryption algorithm to an entire message block at the same time
34
What is a Stream Cipher?
Stream Ciphers operate on one character or bit of a message (or data stream) at a time. The Ceasar Cipher is an example of this.
35
What is Confusion within the context of Cryptography?
Confusion occurs when the relationship between the plaintext and the key is so complicated (what)
36
What is Diffusion within the context of Cryptography?
Diffusion occurs when a chan in the plaintext results in multiple changes spread throughout the ciphertext.
37
Which type of Cryptography does not implement nonrepudiation?
Symmetric key cryptography
38
Asymmetric key algorithms are also known as?
Public Key Algorithms
39
Public Key Algorithms are also known as?
Asymmetric key algorithms
40
Which cryptosystem provides a key revocation mechanism?
Asymmetric
41
Which cryptosystem is faster, Symmetric or Asymmetric?
Symmetric
42
What is the key length of DES?
56-bit (with an additional 8 parity bits)
43
How many parity bits does DES use?
8
44
How does Cipher Block Chaining (CBC) work?
Each block of unencrypted text is XORed with the encrypted block before it.
45
How does Cipher Feedback Mode (CFB) work?
Cipher Feedback Mode (CFB) is the streaming cipher version of Cipher Block Chaining (CBC).
46
How does Output Feedback Mode (OFM) work?
Instead of XORing with previous block, it's uses a seed value. The seed is then put through DES to provide a seed for the next block.
47
What is Counter Mode (CTR)?
Instead of using a seed, it uses a counter which increments with each block.
48
What do the E's in Triple (DES-EEE3/EDE3) mean?
The E's indicate where there are encryption operations.
49
What was IDEA developed to address?
IDEA uses a longer key than DES
50
Where is IDEA used?
IDEA is used in PGP
51
What are the unique improvements of Blowfish compared to DES and IDEA?
It has variable length keys and is much faster
52
What is the unique feature of Skipjack?
Is supports the escrow of encryption keys.
53
What is Twofish and what makes it unique?
It was a AES finalist which supports Prewhitening and Postwhitening
54
What is Prewhitening?
Prewitening involves XORing the plaintext with a separate subkey before the first round of encryption by Twofish.
55
What is Postwhitening?
Postwhitening is XORing the ciphertext after the 16th round of encryption by Twofish.
56
Where is Blowfish commonly used?
SSH
57
What is Offline Distribution?
The physical exchange of a key
58
What are Fair Cryptosystems Escrow approach?
The secret keys are used are divided into two or more pieces and all given to third parties.
59
What is the Escrowed Encryption System?
This escrow approach provides the government with the meant to decrypt ciphertext
60
What is the problem with Merkle-Hellman Knapsack?
It was broken in 1984
61
What is the Key Length of RSA?
1024 bits
62
What is the key length of DSA?
1024 bits
63
What is the key length of Elliptic Curve?
160 bits
64
What is the major disadvantage of El Gamal?
The algorithm doubles the length of the message it encrypts
65
What is a unique feature/advantage of Elliptic Curve?
A 160 bit Elliptic Curve cipher is as strong as 1024 bit RSA
66
Which Hashing functions are no longer suitable?
MD2, MD4 and MD5
67
What two components make up a Digital Signature?
Digital Signature = Message Hash + Ciphertext
68
With PKI, which key do you use if you want to encrypt a message?
The recipients public key
69
With PKI, which key do you use if you want to decrypt a message sent to you?
Your private key
70
With PKI, which key do you use if you want to digitally sign a message you are sending to someone else?
Your private key
71
With PKI, which key do you use if you want to verify the signature on a message that was sent to you?
The senders public key
72
What does HMAC not provide?
It does not provide nonrepudiation because it is a form of symmetric hashing.
73
What is a Certificate Authority (CA)?
They issue certificates (such as godaddy and verisign)
74
What is a Registration Authority (RA)?
RA's assist CA's with verifying users' identities prior to issuing digital certificates.
75
What is a Certificate Revocation List (CRL)?
A list maintained by the CA containing the serial numbers of certs which have been revoked.
76
What is an Online Certificate Status Protocol (OSCP)?
Cuts down on the latency of a Certificate Revocation List being distributed by providing an online real-time check.
77
When should you encrypt an email?
When you need confidentiality
78
When should you hash an email?
When you want integrity
79
When should you digitally sign an email?
When you need confidentiality, integrity, authentication and nonrepudiation.