Module 18 - Cryptography Flashcards
(210 cards)
Which two major classes of encryption are used to ensure data confidentiality?
Symmetric and asymmetric encryption
Which encryption type uses the same key for both encryption and decryption?
Symmetric encryption
Which encryption type uses one key to encrypt and a different key to decrypt data?
Asymmetric encryption
Which encryption type uses different keys for encryption and decryption, making it slower but ideal for secure transactions like HTTPS?
Asymmetric encryption
Which encryption class typically uses shorter key lengths between 40 and 256 bits and is faster in processing?
Symmetric encryption
Which encryption class can use keys as long as 4096 bits and is computationally taxing?
Asymmetric encryption
Which encryption approach is preferred for encrypting bulk data such as VPN traffic due to its speed?
Symmetric encryption
Which key-based mechanism must be established before any symmetric encryption can occur?
A PSK (Pre-shared key)
Which encryption algorithm uses 64-bit block sizes and is considered a legacy method that should not be used?
DES (Data encryption standard)
Which symmetric stream cipher is known for using a 160-bit key and offers a CPU-efficient alternative to AES?
SEAL (Software Optimized encryption Algorithm)
Which algorithm repeats the DES process three times and is set to retire in 2023, and should only be used with very short key lifetimes?
3DES (Triple Data encryption standard)
Which symmetric encryption standard offers flexible key lengths of 128, 192, or 256 bits and encrypts matching-sized data blocks?
AES (Advanced Encryption Standard)
Which stream cipher developed by Ron Rivest was widely used to secure web traffic but is now considered insecure due to vulnerabilities?
RC4
Which symmetric cipher category transforms fixed-length plaintext blocks into ciphertext blocks, such as 64 or 128 bits?
Block cipher
Which symmetric cipher category encrypts one byte or bit at a time and continuously encrypts data as it flows?
Stream cipher
Which type of cipher is typically faster in real-time applications due to its continuous encryption model?
Stream cipher
Which older cipher method is still referenced as an example of stream ciphers, despite no longer being secure?
RC4
Which stream cipher is specifically used for encrypting GSM cellular communications?
A5
Which minimum key length should be used in symmetric encryption to ensure reasonable security against key discovery?
128 bits
Which key length range is generally used in modern symmetric encryption to balance performance and security?
112 to 256 bits
Which cipher mode is AES an example of, given its 128-bit block size and multi-key length options?
Block cipher
Which encryption approach would be appropriate for encrypting large amounts of traffic over a VPN due to low CPU usage?
Symmetric encryption
Which encryption algorithm was designed by Rivest, Shamir, and Adleman and falls under asymmetric encryption?
RSA
Which infrastructure is associated with managing public/private keys in asymmetric encryption?
PKI (Public key infrastructure)