Module 7 - Understanding Cryptography - Q&A Flashcards

1
Q
Data that is said to be easily readable by humans or machines is called \_\_\_\_\_\_\_\_\_\_.
A. ciphertext
B. plaintext
C. coded text
D. encrypted text
A

B. Data that is said to be easily readable by humans or machines is called plaintext.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q
Which of the following is the process used to convert ciphertext to plaintext?
A. Decryption
B. Encryption
C. Encoding
D. Enciphering
A

A. Decryption is the process used to convert ciphertext to plaintext.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q
Which of the following terms describes data that is stored on media, usually in the form of files?
A. Data-in-RAM
B. Data-in-process
C. Data-in-transit
D. Data-at-rest
A

D. Data-at-rest describes data that is stored in the form of files on storage media.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q
Which of the following terms refers to the output that comes from hashing a piece of text?
A. Cipher
B. Code
C. Message digest
D. Key
A

C. A message digest, or hash, is the resultant output from hashing a piece of text.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

How is hashing unlike the encryption and decryption processes?
A. Hashes are not normally reversed or decrypted.
B. Hashes are encoded but not enciphered.
C. Hashes must be decrypted by a key different from the one that was used to encrypt them.
D. Hashes use the same key to encrypt and decrypt.

A

A. Hashes are not normally reversed or decrypted.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q
Which of the following terms describes a cryptovariable?
A. Key
B. Algorithm
C. Cipher
D. Hash
A

A. A cryptovariable is also known as a key.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q
Which of the following components of cryptography are typically publicly known and tested?
A. Key
B. Algorithm
C. Cryptovariable
D. Cryptosystem
A

B. Algorithms are typically publicly known and tested to ensure their dependability.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q
Which of the following types of algorithms encrypts specified sizes of groups of text at a time?
A. Asymmetric
B. Symmetric
C. Streaming
D. Block
A

D. Block algorithms encrypt entire groups of bits of text, usually of specific sizes.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q
Which of the following types of keys can decrypt only what another key encrypts? (Choose two.)
A. Public key
B. Symmetric key
C. Private key
D. Session key
A

A, C. Public keys and private keys reside in a key pair, and what one key encrypts, only the other key can decrypt, and vice versa.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q
You must implement a cryptography system in your organization. You need to be able to send large amounts of data, quickly, over the network. The system will be used by a very small group of users only, and key exchange is not a problem. Which of the following should you consider?
A. Asymmetric cryptography
B. Symmetric cryptography
C. Hybrid cryptography
D. Key escrow
A

B. In this scenario, symmetric key cryptography would probably be the best choice, since the user group is very small and key exchange is not a problem. You also have the requirements of speed and efficiency, as well as the ability to send large amounts of data. All of these are advantages of using symmetric key cryptography.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What are the characteristics of DES?

A
  • Symmetric Algorithm
  • 16 rounds of encryption
  • 64-bit blocks
  • 56-bit keys
  • 5 modes of operation
  • Well documented weaknesses
  • Deprecated
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What are the characteristics of 3DES?

A
  • Symmetric Algorithm
  • 3 iterations of DES style encryption
  • 3 56-bit key bundles
  • Some similar weaknesses to DES
  • Deprecated
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What are the characteristics of AES?

A
  • Symmetric Algorithm
  • De-facto standard for U.S. gov. & private/commercial.
  • Block cipher
  • 128-bit block sizes
  • 128/192/256-bit keys
  • 10/12/14 rounds of encryption (depending on which key is used)
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What are the characteristics of Blowfish?

A
  • Symmetric Algorithm
  • 64-bit blocks
  • 32 to 448 bit keys
  • 16 rounds of encryption
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What are the characteristics of Twofish?

A
  • Symmetric Algorithm
  • 128-bit blocks
  • 128/192/256-bit keys
  • 16 rounds of encryption
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What are the characteristics of RC4?

A
  • Symmetric Algorithm
  • Streaming cypher
  • Single round of encryption
  • 40 to 2048-bit key
  • Very fast
  • Used in WEP/SSL & TLS
  • Has documented weaknesses
  • Deprecated
17
Q

What are the characteristics of RSA?

A
  • Asymmetric Algorithm
  • 1 round of encryption
  • 1024 to 2048-bit keys
  • De-fact algorithm used in most public key cryptography today
18
Q

What are the characteristics of Diffie-Hellman (DHE)?

A
  • Series of key exchange protocols and variants to establish secure communications sessions over insecure channels even when two parties have no previous relationship with each other.
19
Q

What are the characteristics of PGP/GPG?

A
  • Not an algorithm, but is a cryptography application and protocol suite used in asymmetric cryptography.
  • Can use both asymmetric and symmetric keys
  • Used for bulk encryption, data-at-rest encryption, key-pair generation, and key exchange
20
Q

What are the characteristics of ECC?

A
  • Elliptic Curve Cryptography
  • Asymmetric Algorithm
  • Widely implemented in smart phones and other limited power devices
21
Q

What are the characteristics of ElGamal?

A
  • Asymmetric algorithm
  • Used for digital signatures and general encryption
  • Partially based on DHE
  • Widely used in open standards such as PGP/GPG, DSA, etc.
22
Q

Describe the characteristics of Hashing…

A
  • Not the same as encryption/decryption
  • Hashes cannot be reversed/decrypted
  • Can only be compared to see if they match
  • Used to provide confidentiality and integrity
23
Q

What are the characteristics of MD5?

A
  • Hashing Algorithm
  • Generates a 128-bit hash 32 hexadecimal characters long regardless of the length of input
  • Has been proven to have collisions
  • Deprecated
24
Q

What are the characteristics of SHA

A
  • Hashing Algorithm
  • Series of algorithms
  • SHA-0 is fully deprecated
  • SHA-1 has similar flaws to MD5 and is deprecated
  • SHA-2 is made of SHA-256 and SHA-512
  • SHA-2 is deprecated
  • SHA-3 is based on Keccak and is current standard.
25
Q

What are the characteristics of RIPEMD?

A
  • RACE Integrity Primiteves Evaluation Message Digest
  • Hashing Algorithm
  • 128/160/256/320-bit versions
  • Not in widespread use
  • RIPEMD-160 is most common
26
Q

What are the characteristics of HMAC?

A
  • Hashing Algorithm
  • Used in conjunction with a symmetric key both to authenticate and verify integrity of the message.
  • Can use MD5/SHA
  • Produces a Message Authentication Code (MAC)
  • Only someone with the key can create the hash