Section 2.8 Basics of Cryptographic concepts Flashcards

1
Q

What do you call the conversion of machine-readable and human-readable communicated information into an unreadable form that keeps the information confidential and private?

A

Cryptography

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

The central function of cryptography is _________, the transformation of data into an unreadable form.

A

Encryption

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Encryption ensures _______ by keeping the information hidden from those for whom the information is not intended.

A

Confidentiality

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What transforms encrypted data back into an intelligible form?

A

Decryption

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Cryptography also supports ________ by making systems better able to handle resource constraints.

A

High resiliency

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Cryptographic algorithms and techniques are chosen based on?

A

The level of protection required and resource constraints

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

The number of bits that are within an encryption algorithm’s key is?

A

Key length/size

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

The set of all possible permutations of a key is the?

A

Keyspace

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Data integrity is maintained by using what cryptologic function?

A

Hashing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is often used to create signatures for files that indicate whether a file has been tampered with?

A

Hashing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What cryptologic function is used to maintain Authentication?

A

Encrypted digital certificates are used to identify users electronically on a network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

By implementing _____________ processes, a cryptographic system can be considered secure for business and legal transactions?

A

Nonrepudiation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What concept provides security by modifying the data to make it unreadable to a human or program trying to use it?

A

Obfuscation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

A system that provides encryption and decryption services is called a?

A

Cryptosystem

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

A cryptosystem uses a mathematical encryption ___________ to turn data into ciphertext?

A

Algorithm/Cipher

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

A _______ is like a password that’s combined with an algorithm to create the ciphertext.

A

key

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

The strength of an encryption key depends on the algorithm’s what?

A

keyspace

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Most attacks on encryption center on what?

A

The interception of keys

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

What concept means that the outcome of the ciphertext is dependent on several parts of the key, rather than only one? This concept increases the change in the plaintext to ciphertext.

A

Confusion

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

What concept means that even a small change in the plaintext results in a significant change in the ciphertext?

A

Diffusion

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

What type of cipher switches out the plaintext characters with other characters?

A

Substitution Cipher

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

What type of cipher rearranges the characters in different places through mathematical formulas?

A

Transposition Cipher

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

What encryption scheme has both parties using the same key to encrypt and decrypt?

A

Symmetric Encryption/Secret Key

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

The security of Symmetric Encryption depends on?

A

Users keeping their keys private

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
A symmetric systems is much faster than asymmetric encryption because what?
The underlying algorithms are simpler and more efficient.
26
What type of symmetric encryption encrypts data one bit at a time?
Stream Ciphers
27
What is the most commonly found streaming cipher, found in the Wired Equivalent Privacy (WEP) protocol?
RC4
28
What type of symmetric encryption encrypts entire blocks of data?
Block Ciphers
29
What do you call authentication schemes that have been developed to work with block ciphers to provide not only encryption but also authentication?
Authenticated models of operation/Authenticated encryption
30
What encryption scheme uses 2 mathematically-related, different keys to encrypt and decrypt?
Asymmetric Encryption scheme
31
What encryption concept involves a 3rd party, such as a government agency or an authorized organization, that holds a special third key used to encrypt the private key, which is then stored in a secure location?
Key escrow
32
The advantage of an asymmetric scheme over symmetric schemes is that it offers a level of?
Authentication and Nonrepudiation
33
What kind of cryptosystem uses complex mathematical structures to create secure asymmetric algorithms and keys? Often used as a lightweight solution, provides functionality such as encryption an digital signatures.
Elliptic-curve Cryptography (ECC)
34
What kind of key exchange takes places within the normal communication channel?
In-band key exchange
35
what kind of key exchange utilizes a separate channel outside the norm to authenticate the user?
Out-of-band Key exchange
36
What do you call temporary keys that are made each time a key is needed and are temporary in nature?
Ephemeral Keys
37
What is designed by using complex cryptographic protocols to prevent the situation where a compromise of one secret key or message leads to a compromise of previous confidential messages?
Perfect Forward Secrecy (PFS)
38
What do you call a randomly generated input often used in hashing?
Salt
39
What do you call a one-time use number that are randomly created to ensure if the same message is encrypted twice then the outcomes are different?
Initialization Vector (IV)
40
What do you call numbers that are used once for a limited time?
Nonces
41
What are the difference between nonces and IV's?
IV's are random
42
What do you call the process of taking a weak key and making it stronger against attacks by creating an enhanced key; an initial key and hash function or block cipher applied in a loop?
Key stretching
43
What kind of cryptography uses light waves pulsing over fiber optic cable to transmit code which shares the key between two users?
Quantum Cryptography
44
What kind of encryption encrypts data while it is being processed? It also allows for computation to take place on ciphertext, with a result that matches what the value of the plaintext would have been if not encrypted.
Homomorphic Encryption
45
What concept refers to algorithms, generally asymmetric, that are considered secure against attacks using quantum computing?
Post-Quantum Computing
46
What is the concept of hiding data in other media such as graphic images, digital audio, or video files?
Steganography
47
What do you call publicly accessible ledgers that record online transactons?
Blockchains
48
What prevent messages from being modified in transit?
Hashing algorithms
49
What do you call a mathematical function that takes a variable-sized message and transforms it into a fixed-length value? Difficult to reverse and the results are never decrypted.
One-way Hash
50
What do you call the output of a one-way hash?
Hash Value/Message Digest
51
Attacks against one-way hash functions can be prevented by using?
longer hash values
52
What occurs when 2 different hash messages result in the same hashing value?
Hash value collisions
53
What attack occurs when an attacker intercepts a hash and uses it to authenticate directly, rather than using the underlying plaintext password?
Pass the Hash Attack
54
What is created when the digest of the message is encrypted using the sender's private key?
Digital signature
55
What hash produces a 128-bit hash value used for security applications and integrity checking?
MD5
56
What do you call a key agreement protocol that enables users to exchange encryption keys over an insecure medium?
Diffie-Hellman Exchange (DHE)
57
What key agreements allow the two parties to authenticate each other through the addition of more advanced technologies and is used in the Public Key Infrastructure?
Elliptic-curve Diffie-Hellman Exchange (ECDHE)
58
What asymmetric algorithm is used for both digital signatures and general encryption? Widely used in open standards and cryptosystems, including PGP and GPG.
ElGamal
59
What is the digital authentication standard of the US Government?
Digital Signature Algorithm (DSA)
60
What do you call an encrypted hash value used to ensure the identity and integrity of a message?
Digital signature
61
What guarantees the individual sending the message is who he claims to be?
Digital signature
62
What is the hash function message digest originally based on MD4?
RIPEMD
63
What is used as an algorithm for message authentication purposes, where the authentication is applied using hash functions and a secret key to create an authentication code value?
Hash-based Message Authentication Code (HMAC)
64
Information assurance through encryption protects information and information systems by securing their what?
Confidentiality, integrity, authentication, and nonrepudiation
65
Random numbers are often used within algorithms to prevent?
Replay attacks
66
What do you call a small, fast key that is used for encryption in small mobile devices?
ECC
67
What is a feature of specific key agreement protocols that assures session keys will not be compromised if long-term secrets (private keys) used in session key exchange are compromised?
PFS
68
What indicates that a cryptographic system generates random public keys for each session and it does not use a deterministic algorithm in the process?
PFS
69
What encryption algorithm is typically used for bulk encryption/encrypting large amounts of data?
Symmetric
70
What kind of encryption algorithm is AES256?
Symmetric
71
What encryption algorithm is typically used for the distribution of symmetric bulk encryption keys (shared keys)?
Asymmetric
72
What encryption algorithm is typically used for identity authentication via digital signatures and certificates?
Asymmetric
73
What encryption algorithm is typically used for non-repudiation services and key agreements?
Asymmetric
74
What are typically used for the verification of digital signatures?
Hash functions
75
What are typically used for the generation of pseudo-random numbers?
Hash functions
76
What do you call the practice of harnessing the principles of quantum mechanics to improve security and detect whether a third party is eavesdropping on communications?
Quantum Cryptography
77
What mode of operation for block ciphers is the simplest and least secure mode? Processes 64-bit blocks, encrypts blocks with the chosen key.
Electronic Codebook Mode (ECB)
78
What mode of operation for block ciphers has each block of unencrypted text XORed with the block of ciphertext immediately preceding?
Cipher Block Chaining (CBC)
79
What mode of operation for block ciphers uses an incrementing counter instead of a seed? Errors do not propagate.
Counter (CTR)
80
What is the go to option for encryption for low power small devices?
ECC (Asymmetric)
81
What is the go to option for encryption for the military?
AES 256 (Symmetric)
82
What kind of encryption allows users to run calculations on data while it is still encrypted?
Homomorphic Encryption
83
What kind of encryption allows data to be encrypted and out-sourced to commercial clouds for processing?
Homomorphic Encryption
84
Low power devices often use _________ for encryption, as it uses a small key.
ECC
85
What should be used to check/support file integrity?
File Hash
86
What can be used to ensure integrity for email?
Digital signatures