Encryption Fundamentals Flashcards

1
Q

DES

A

Data Encryption Standard, 56-bit key, 64-bit block cipher, insecure due to brute-force vulnerability.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

3DES

A

Triple DES applies DES three times, more secure than DES but slower and outdated.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

AES

A

Advanced Encryption Standard, supports 128/192/256-bit keys, widely used and secure.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

RC4

A

Stream cipher in the RC family, deprecated due to keystream bias and insecurity.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

RC5

A

Block cipher with variable block size, key size, and number of rounds.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

RC6

A

Advanced block cipher based on RC5, finalist in AES competition.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

RSA

A

Public key cryptosystem based on factoring large prime numbers, used for encryption and digital signatures.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

DSA

A

Digital Signature Algorithm, used only for digital signatures, based on discrete logarithms.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

ECC

A

Elliptic Curve Cryptography, efficient public-key system with smaller keys than RSA.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

ECDSA

A

Elliptic Curve Digital Signature Algorithm, variant of DSA using ECC.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

ElGamal

A

Asymmetric encryption scheme based on Diffie-Hellman, supports encryption and signatures.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

ECB

A

Electronic Codebook Mode, simple but insecure as it reveals patterns.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

CBC

A

Cipher Block Chaining Mode, uses IV and XOR to chain encryption.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

CTR

A

Counter Mode, turns block cipher into stream cipher using counters.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

GCM

A

Galois/Counter Mode, combines encryption and authentication.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

CFB

A

Cipher Feedback Mode, stream cipher mode using block cipher.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

OFB

A

Output Feedback Mode, another stream-like mode avoiding error propagation.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

MAC

A

Message Authentication Code, ensures data integrity and authenticity with a shared secret.

19
Q

HMAC

A

Keyed-hash MAC using hash functions like SHA-256 for strong integrity checks.

20
Q

AEAD

A

Authenticated Encryption with Associated Data, provides confidentiality and integrity.

21
Q

Diffie-Hellman

A

Key exchange method allowing two parties to establish a shared secret.

22
Q

ECDH

A

Elliptic Curve Diffie-Hellman, efficient key exchange over ECC.

23
Q

PFS

A

Perfect Forward Secrecy, ensures compromise of long-term keys doesn’t affect past sessions.

24
Q

DHE

A

Ephemeral Diffie-Hellman, supports PFS by generating temporary keys per session.

25
IKE
Internet Key Exchange, protocol used to set up security associations in IPsec.
26
ISAKMP
Internet Security Association and Key Management Protocol, works with IKE.
27
Steganography
Concealing messages within other media, like images or audio.
28
Obfuscation
Making code or communication harder to understand but not encrypted.
29
Quantum Cryptography
Uses quantum mechanics for secure communication, like QKD.
30
Post-Quantum Cryptography
Algorithms resistant to quantum attacks (e.g., lattice-based).
31
Homomorphic Encryption
Allows computations on encrypted data without decryption.
32
Format-Preserving Encryption
Encrypts data while keeping format intact (e.g., credit card numbers).
33
SHA-2
Secure Hash Algorithm 2, family including SHA-256, widely used.
34
SHA-3
Latest secure hash function standard, different construction than SHA-2.
35
Salting
Adds randomness to password hashes to prevent precomputed attacks.
36
PBKDF2
Key derivation function using multiple hash iterations to harden passwords.
37
Argon2
Memory-hard KDF, winner of the Password Hashing Competition.
38
Digital Signature
Cryptographic method of proving message authenticity and integrity.
39
X.509 Certificate
Standard format for public key certificates.
40
PKI
Public Key Infrastructure, framework to manage digital certificates.
41
Key Rotation
Regularly changing cryptographic keys to limit exposure.
42
Key Escrow
Storing encryption keys with a third party for recovery or access.
43
Key Exchange
Securely transferring cryptographic keys between parties.