ECM 1407 Encryption Flashcards

1
Q

What can modern cryptography be defined as?

A

The study of mathematical techniques for securing digital data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

How does Caesar’s Cipher work?

A

Shifts each letter by a set amount

e.g. A -> E, B ->F

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What are the two principles of cryptography?

A

Security by obscurity
Kerckhoff’s principle

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is security by obscurity?

A

Improving security by keeping the algorithm secret

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is Kerckhoff’s principle?

A

The cipher method must not be required to be secret, and the message must be able to fall into the hands of the enemy

Everything except the keys are public knowledge

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is the mono-alphabetic substitution?

A

Defines a map from each letter to some letter of the alphabet, where the map is arbitrary, instead of a fixed shift.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is the difference between symmetric and asymmetric encryption?

A

Symmetric uses one key for encryption and decryption

Asymmetric makes use of a public key for encryption and a private key for decryption

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is a stream cipher?

A

an encryption technique that works byte by byte to transform plain text into code that’s unreadable to anyone without the proper key.
Stream ciphers are linear, so the same key both encrypts and decrypts messages. And while cracking them can be difficult, hackers have managed to do it.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is a block cipher?

A

a method of encrypting data in blocks to produce ciphertext using a cryptographic key and algorithm.
The block cipher processes fixed-size blocks simultaneously, as opposed to a stream cipher, which encrypts data one byte at a time.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What are the origins of RSA?

A

A public-key cryptosystem, one of the oldest, that is widely used for secure data transmission. The acronym “RSA” comes from the surnames of Ron Rivest, Adi Shamir and Leonard Adleman, who publicly described the algorithm in 1977

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

How does RSA work?

A

1) Choose 2 large prime numbers p and q

2) Calculate n = p * q

3) z = (p - 1) * (q - 1)

4) Choose e to be relatively prime (no other common factors than 1) to z

5) Choose d such that (d*e) mod z = 1

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What are the RSA equations?

A

M = plaintext block
C = encrypted block
C = M^e mod n
M = C^d mod n

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What are 3 examples of digital signatures?

A

Private keys
Hashing
Tarballs

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is an example of an awry software implementation? What was the issue?

A

The heartbleed bug

When a word with more characters than specified, the word is promptly returned as expected, but with random spare data that often reveals sensitive data about the machine and its user.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What websites were affected by the heartbleed bug?

A
  • Yahoo!, Imgur, Stack Overflow, Slate, DuckDuckGo
  • These sites asked users to promptly change their passwords
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What information is not picked up on by intruders through HTTPS as opposed to HTTP?

A

The User
The Data

17
Q

What is information is transmitted from a system to a site that can be used by intruders?

A

The url
The User
The Data
The machine’s location

17
Q

Who can intercept the connection between 2 ISPs?

A

The National Security Agency (NSA)

17
Q

What is Tor?

A

A free and open-source software for enabling anonymous communication. It directs Internet traffic via a free, worldwide, volunteer overlay network that consists of more than seven thousand relays. Using Tor makes it more difficult to trace a user’s Internet activity.

It uses multiple router keys that act as protective layers that the interceptors will reach as opposed to the core connection

17
Q

What are 3 kinds of parties that have access to your Internet Service Provider (ISP)?

A

Lawyers
Police
System Administrators

18
Q

What can external parties receive from an Internet user’s ISP who is using Tor?

A

Only the location. Tor encrypts the rest

19
Q

What is the double edged sword in Tor?

A

+ It allows good people to do what they want to do without the government controlling them
- It allows bad people to do what they want to do without the government controlling them

20
Q

What are some symmetric encryption programs?

A

AES
Blowfish
Twofish

21
Q

What are some asymmetric encryption programs?

A

ECC
ELGamal
RSA

22
Q

What surveillance tech was leaked by Edward Snowden?

A

RAMPART-A

23
Q

What does the Online Safety Bill say to encryption?

A

An offence is committed if the participant submits data to OFCOM that cannot be decrypted.

24
Q

What must participants under the OSB do?

A

It provides a legal duty for social media companies to put in place systems and processes that tackle child sexual abuse on their services irrespective of the technology they use
Companies failing to comply with such systems and processes face Ofcom, which is able to impose fines of up to £18 million or 10% of the company’s global annual turnover - depending on which is higher.