lecture 5 Flashcards

(49 cards)

1
Q
A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is Cryptography?

A

Cryptography is scrambling information so it cannot be read and transforms information into a secure form so unauthorised persons cannot access it

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is Steganography?

A

Steganography hides the existence of data by embedding hidden messages in images audio or video files

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

How is data hidden using Steganography?

A

Data is divided and hidden in unused portions of the file or in file header fields between metadata sections

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is Encryption?

A

Encryption is changing original text into a secret message using cryptography

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is Decryption?

A

Decryption is changing the secret message back to its original form

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is Plaintext?

A

Plaintext is unencrypted data to be encrypted or the output of decryption

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is Ciphertext?

A

Ciphertext is the scrambled and unreadable output of encryption

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is Cleartext?

A

Cleartext data is data stored or transmitted without encryption

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What does a Cryptographic Algorithm do?

A

A cryptographic algorithm uses mathematical formulas to encrypt and decrypt data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is a Key in cryptography?

A

A key is a mathematical value entered into the algorithm to produce ciphertext and is used in reverse to decrypt

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is a Substitution Cipher?

A

A substitution cipher replaces one character with another

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is ROT13?

A

ROT13 is a substitution cipher where the alphabet is rotated 13 steps such that A becomes N

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is an XOR cipher?

A

An XOR cipher uses the binary operation eXclusive OR to compare bits returning 1 if bits differ and 0 if identical

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What protections can Cryptography provide?

A

Confidentiality integrity authentication nonrepudiation and obfuscation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is Confidentiality in cryptography?

A

Confidentiality ensures only authorised parties can view the information

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

What is Integrity in cryptography?

A

Integrity ensures that information is correct and unaltered

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

What is Authentication in cryptography?

A

Authentication verifies the sender through cryptography

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

What is Nonrepudiation?

A

Nonrepudiation proves that a user performed an action and cannot deny it

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

What is Obfuscation?

A

Obfuscation is making something obscure or unclear often used as security through obscurity

21
Q

What are the three states of data Cryptography protects?

A

Data in processing data in transit and data at rest

22
Q

What is a limitation of Cryptography related to low-power devices?

A

Low-power devices require protection but have limited resources restricting strong cryptography use

23
Q

What is the Resource vs Security Constraint?

A

It is the balance between available resources like time and energy and the security level provided by cryptography

24
Q

What are the three categories of Cryptographic Algorithms?

A

Hash algorithms symmetric cryptographic algorithms and asymmetric cryptographic algorithms

25
What does a Hash Algorithm do?
A hash algorithm creates a unique digital fingerprint called a digest representing the contents of data
26
What are characteristics of a Secure Hash?
Fixed size unique original and secure meaning the hash cannot be reversed to find original data
27
What is Symmetric Cryptography?
Symmetric cryptography uses the same single key to encrypt and decrypt data also called private key cryptography
28
Name some common Symmetric Algorithms.
DES 3DES AES RC Blowfish
29
What is the primary weakness of Symmetric Cryptography?
The difficulty in securely distributing and maintaining a single key among multiple users
30
What is Asymmetric Cryptography?
Asymmetric cryptography uses two mathematically related keys a public key and a private key
31
What is a Public Key?
A public key is available to everyone and freely distributed
32
What is a Private Key?
A private key is known only to its owner and kept secret
33
Name some Asymmetric Cryptographic Algorithms.
RSA ECC DSA Diffie-Hellman
34
What is RSA based on?
RSA is based on multiplying two large prime numbers and the security relies on factoring
35
What is Elliptic Curve Cryptography (ECC)?
ECC uses elliptic curves and smaller keys requiring less computing power often used for mobile devices
36
What is a Digital Signature?
A digital signature is an electronic verification of the sender ensuring authenticity and integrity
37
What is the purpose of Key Exchange protocols?
To securely share cryptographic keys within normal communication channels
38
Name some Key Exchange protocols.
Diffie-Hellman Diffie-Hellman Ephemeral Elliptic Curve Diffie-Hellman Perfect forward secrecy
39
What are common Cryptographic Attacks?
Algorithm attacks and collision attacks
40
What is an Algorithm Attack?
An attack using methods like known ciphertext attacks downgrade attacks or exploiting misconfigurations to bypass strong algorithms
41
What is a Collision Attack?
An attack that tries to find two inputs producing the same hash causing a hash collision
42
What is a Birthday Attack?
A collision attack based on the birthday paradox estimating probability of two inputs having the same hash
43
What is Quantum Cryptography?
Quantum cryptography uses quantum computing principles to enhance cybersecurity and detect eavesdroppers
44
What is a major risk of Quantum Computing for Cryptography?
Quantum computers could quickly factor large numbers breaking current asymmetric cryptographic algorithms
45
How can Cryptography be applied?
Cryptography can be applied through software or hardware
46
What is Full Disk Encryption (FDE)?
FDE encrypts the entire hard drive preventing unauthorized data access even if the drive is moved
47
What is a Trusted Platform Module (TPM)?
A TPM is a hardware chip on a motherboard providing cryptographic services and protection against software attacks
48
What are Self-Encrypting Drives (SEDs)?
SEDs are hard drives that encrypt all data stored on them and authenticate the host device on power-up
49
What is Blockchain?
Blockchain is a shared immutable ledger recording transactions across multiple computers using cryptographic hash algorithms