M2: Cryptographic building blocks - C2 Flashcards

1
Q

What is encryption?

M2: Cryptographic building blocks - C2

A

Turning readable data into a secret code to keep it safe.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is decryption?

M2: Cryptographic building blocks - C2

A

Turning the secret code back into readable data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is symmetric-key encryption?

M2: Cryptographic building blocks - C2

A

Using the same key to both encrypt and decrypt data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is public-key encryption?

M2: Cryptographic building blocks - C2

A

Using a public key to encrypt data and a private key to decrypt it.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is a digital signature?

M2: Cryptographic building blocks - C2

A

A unique tag added to a message to verify the sender’s identity.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is a cryptographic hash function?

M2: Cryptographic building blocks - C2

A

A function that converts data into a fixed-size string of characters which appears random.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is message authentication?

M2: Cryptographic building blocks - C2

A

Ensuring that a message comes from a legitimate source and hasn’t been altered.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is authenticated encryption?

M2: Cryptographic building blocks - C2

A

Combining encryption and authentication to protect data confidentiality and integrity.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is a certificate?

M2: Cryptographic building blocks - C2

A

A digital document that verifies the ownership of a public key.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is the Vernam cipher?

M2: Cryptographic building blocks - C2

A

An encryption method using a key as long as the message known for being unbreakable if used correctly.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is a one-time pad?

M2: Cryptographic building blocks - C2

A

A type of Vernam cipher where the key is used only once and is as long as the message.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is a block cipher?

M2: Cryptographic building blocks - C2

A

An encryption method that processes data in fixed-size blocks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is a stream cipher?

M2: Cryptographic building blocks - C2

A

An encryption method that processes data one bit or byte at a time.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is the Advanced Encryption Standard (AES)?

M2: Cryptographic building blocks - C2

A

A widely used block cipher for securing data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is the Caesar cipher?

M2: Cryptographic building blocks - C2

A

An ancient encryption technique that shifts letters by a fixed number of places.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is exhaustive key search?

M2: Cryptographic building blocks - C2

A

Trying all possible keys until the correct one is found.

17
Q

What is a passive adversary?

M2: Cryptographic building blocks - C2

A

An attacker who only observes and records data without altering it.

18
Q

What is an active adversary?

M2: Cryptographic building blocks - C2

A

An attacker who can alter data or inject new data into the communication.

19
Q

What is a known-plaintext attack?

M2: Cryptographic building blocks - C2

A

An attack where the adversary has access to both the plaintext and its ciphertext.

20
Q

What is a chosen-plaintext attack?

M2: Cryptographic building blocks - C2

A

An attack where the adversary can choose the plaintext and see the resulting ciphertext.

21
Q

What is a chosen-ciphertext attack?

M2: Cryptographic building blocks - C2

A

An attack where the adversary can choose the ciphertext and see the resulting plaintext.

22
Q

What is the Electronic Codebook (ECB) mode?

M2: Cryptographic building blocks - C2

A

A block cipher mode where each block is encrypted independently.

23
Q

What is the Cipher Block Chaining (CBC) mode?

M2: Cryptographic building blocks - C2

A

A block cipher mode where each block of plaintext is XORed with the previous ciphertext block before being encrypted.

24
Q

What is the Counter (CTR) mode?

A

A block cipher mode that turns a block cipher into a stream cipher by encrypting a counter value.

25
What is a hybrid encryption? ## Footnote M2: Cryptographic building blocks - C2
Using public-key encryption to share a symmetric key which is then used for encrypting the actual message.
26
What is RSA encryption? ## Footnote M2: Cryptographic building blocks - C2
A public-key encryption method based on the difficulty of factoring large numbers.
27
What is data origin authentication? ## Footnote M2: Cryptographic building blocks - C2
Verifying who sent a message.
28
What is data integrity? ## Footnote M2: Cryptographic building blocks - C2
Ensuring that data has not been altered.
29
What is non-repudiation? ## Footnote M2: Cryptographic building blocks - C2
Ensuring that a sender cannot deny sending a message.
30
What is a collision in hash functions? ## Footnote M2: Cryptographic building blocks - C2
When two different inputs produce the same hash value.