Section 7: Cryptographic Solutions Flashcards

1
Q

What is Cryptography?

A

The practice and study of writing and solving codes, focused on encrypting data to protect its confidentiality and integrity.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is an Algorithm (Cipher)?

A

The mathematical process used for encrypting or decrypting data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is a Key?

A

An essential element that determines the output of the cipher, critical for both encryption and decryption.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is Key Length?

A

The length of the key, which is directly proportional to the security level—the longer the key, the harder it is to crack.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is Key Rotation?

A

The practice of regularly changing encryption keys to enhance security over time.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is Symmetric Encryption?

A

A type of encryption that uses the same key for both encryption and decryption.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is Asymmetric Encryption?

A

A type of encryption that uses a pair of keys—a public key for encryption and a private key for decryption.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is DES (Data Encryption Standard)?

A

An early symmetric encryption algorithm that uses a 64-bit key; now considered outdated due to vulnerabilities.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is Triple DES (3DES)?

A

An enhancement of DES that applies encryption three times for improved security.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is IDEA (International Data Encryption Algorithm)?

A

A symmetric encryption algorithm that uses a 128-bit key, known for being faster and more secure than DES.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is AES (Advanced Encryption Standard)?

A

The current standard for symmetric encryption, supporting key sizes of 128, 192, or 256 bits for enhanced security.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What are Blowfish and Twofish?

A

Block cipher algorithms that offer flexibility with varying key lengths.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is the Rivest Cipher (RC) Series?

A

Includes RC4 (a stream cipher) and RC5/RC6 (block ciphers), each with varying key sizes.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is Diffie-Hellman?

A

A method used for secure key exchange between parties; however, it is vulnerable to man-in-the-middle attacks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is RSA (Rivest-Shamir-Adleman)?

A

A widely used asymmetric encryption algorithm for encryption, key exchange, and digital signatures.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is Elliptic Curve Cryptography (ECC)?

A

A form of public key cryptography that is efficient and secure, particularly useful in mobile devices and low-power environments.

17
Q

What is MD5 (Message Digest Algorithm 5)?

A

Produces a 128-bit hash; it is now considered vulnerable due to security flaws.

18
Q

What is the SHA (Secure Hash Algorithm) Family?

A

Includes various algorithms, such as SHA-1, SHA-2, and SHA-3, each providing different levels of security.

19
Q

What is HMAC (Hash-based Message Authentication Code)?

A

Combines hashing with a secret key to ensure data integrity and authenticity.

20
Q

What is Public Key Infrastructure (PKI)?

A

A framework for managing digital keys and certificates necessary for secure data transfers.

21
Q

What is Blockchain?

A

A decentralized, immutable ledger that ensures data integrity and transparency.

22
Q

What are Smart Contracts?

A

Self-executing contracts with predefined conditions, coded directly onto the blockchain.

23
Q

What is Supply Chain Management in Blockchain?

A

Tracks the origin and distribution of products to ensure transparency.

24
Q

What is TPM (Trusted Platform Module)?

A

A hardware security module used for storing cryptographic keys.

25
What is HSM (Hardware Security Module)?
A physical device that manages and secures cryptographic keys.
26
What are Key Management Systems?
Centralized tools designed for managing the lifecycle of cryptographic keys.
27
What is a Secure Enclave?
An isolated processor within a device that securely handles sensitive data.
28
What is Steganography?
A technique that hides a message within another medium, such as an image or audio file, to conceal its existence.
29
What are Downgrade Attacks?
Attempts to force systems to utilize weaker, outdated cryptographic protocols, which may be easier to exploit.
30
What are Collision Attacks?
Occur when two different inputs produce the same hash output, compromising the integrity of the hashing function.
31
What are Quantum Computing Threats?
The potential risk posed by advances in quantum computing, which could quickly solve complex mathematical problems, undermining traditional encryption methods.