Encryption/Decryption Flashcards

(24 cards)

1
Q

What is a cryptosystem?

A

A system that disguises messages so only authorized people can see through the disguise.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is the difference between cryptography and cryptanalysis?

A

Cryptography creates/uses cryptosystems. Cryptanalysis breaks them. Cryptology studies both.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What are plaintext and ciphertext?

A

Plaintext is the original unencrypted message. Ciphertext is the encrypted, disguised message.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What are encryption and decryption?

A

Encryption converts plaintext to ciphertext. Decryption converts ciphertext back to plaintext.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is symmetric key encryption?

A

Sender and receiver use the same key for encryption and decryption.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is public key encryption?

A

Sender and receiver use different keys; public encryption key, computationally infeasible to find decryption key.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is a block cipher?

A

Processes input as blocks of elements, producing an output block for each input block.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is a stream cipher?

A

Processes input elements continuously, producing one output element at a time.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is steganography?

A

Hides a plaintext message, e.g., using first letters or marked subsets to convey a hidden message.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is character marking in steganography?

A

Selected letters in a message are marked (e.g., in pencil) to hide a message.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What are the drawbacks of steganography?

A

Requires significant overhead and becomes worthless once discovered.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What are the key requirements for public key cryptography?

A

Generate secret keys, distribute them securely, and use a protocol for key management.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What are keys in a cryptosystem?

A

Labels for a set of algorithms, enabling authorized recipients to decrypt messages.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is a transposition cipher?

A

Performs a permutation on the plaintext to create ciphertext.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is the rail fence cipher?

A

Simplest transposition cipher; plaintext written as diagonals, read as rows.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What makes a cryptosystem strong?

A

Unbreakable under known plaintext and adaptive chosen plaintext attacks, where attackers iteratively choose plaintext based on prior results.

17
Q

Why is DES considered insecure?

A

Classified design, short 56-bit key, NSA backdoor. Superseded by AES (128+ bit keys).

18
Q

What is the security status of Triple-DES?

A

Mostly practically secure, used in electronic payments, despite reduced effective security (112 bits, 80 per NIST).

19
Q

What is the role of hash functions like MD5 in cryptography?

A

Used as one-way hash functions (e.g., in Crypt), but MD5 is insecure. Modified DES is an alternative.

20
Q

Why is recovering passwords from hashes difficult?

A

Shadowing obscures hashed passwords, making unauthorized access harder.

21
Q

What is a dictionary attack, and how does it work?

A

Exploits users’ tendency to use names/words, trying reversed words, alternative lettering, or adding numbers using cracking software.

22
Q

What are examples of publicly available password cracking software?

A

John the Ripper, Cain and Abel, RainbowCrack (brute force).

23
Q

How do brute force attacks target passwords?

A

Try all possible n-character strings as passwords, e.g., using RainbowCrack.

24
Q

What are effective password security policies?

A

Require 8+ characters, include alpha/digit/special symbols, exclude login/repeated characters, and enforce regular password changes.