Encryption Flashcards

(18 cards)

1
Q

What does RSA stand for in cryptography?

A

Rivest-Shamir-Adleman

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

True or False: RSA relies on the difficulty of factoring large prime numbers.

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Fill in the blank: The security of RSA is based on the difficulty of __________.

A

factoring the product of two large prime numbers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is one common method used to attack RSA encryption?

A

Factoring the modulus (n) into its prime components

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Which algorithm is often used for factoring integers in RSA attacks?

A

The General Number Field Sieve (GNFS)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Multiple Choice: Which of the following is NOT a viable attack method against RSA? A) Brute force attack B) Timing attack C) Quantum attack D) Factoring attack

A

A) Brute force attack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is a timing attack?

A

An attack that exploits variations in the time taken to perform cryptographic operations

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

True or False: Using small public exponents can make RSA more vulnerable to certain attacks.

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What type of attack involves using a quantum computer to break RSA encryption?

A

Shor’s algorithm

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is a common countermeasure to protect against RSA attacks?

A

Using larger key sizes (e.g., 2048 bits or more)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

RSA in-the-middle attack

A

An RSA man in the middle attack works by intercepting the public key sent from one party to another, replacing it with their own public key.
The attacker swaps public keys, decrypts the message, then re-encrypts it to spy or tamper with it.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What are one of the operations that AES performs to encrypt data?

A

MixColummns

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

MixColumns

A

AES treats each column of the 4x4 byte state matrix as a polynomial and mixes its by multiplying it with a fixed matrix over a finite field.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is the primary purpose of a code?

A

To replace words or phrases with other words, symbols, or phrases.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

True or False: A cipher transforms individual letters or bits of data to obscure the original message.

A

True.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Fill in the blank: A code typically operates at the ______ level, while a cipher operates at the ______ level.

A

semantic; syntactic.

17
Q

Which of the following is an example of a cipher? A) Morse code B) Caesar cipher C) Pig Latin

A

B) Caesar cipher.

18
Q

What is a key difference between codes and ciphers?

A

Codes substitute entire words or phrases, while ciphers transform individual letters or bits.