Section 7: Cryptography Flashcards
(144 cards)
Type: Question & Answer
Question: What is the art and science of hiding the meaning of communications from unintended recipients?
Answer: Cryptography
Type: Question & Answer
Question: What is the study of methods to defeat codes and cyphers?
Answer: Cryptoanalysis
Type: Question & Answer
Question: Cryptography and Cryptoanalysis together form:
Answer: Cryptology
Type: Question & Answer
Question: What are keys sometimes referred to as in cryptography?
Answer: Cryptovariables
Type: Question & Answer
Question: Converting readable data (plaintext) into a scrambled, unreadable format (ciphertext) to ensure information is only accessible to authorised individuals supports the goal of:
Answer: Confidentiality
Type: Question & Answer
Question: Making sure that information is protected from unauthorised or accidental changes, often using cryptographic functions like Hash, supports the goal of:
Answer: Integrity
Type: Question & Answer
Question: Verifying the identity of the user, device, or entity during the communication process, often using digital certificates, supports the goal of:
Answer: Authentication
Type: Question & Answer
Question: What goal of cryptography prevents an entity from denying its involvement in a transaction or activity, ensured by digital signatures?
Answer: Non-Repudiation
Type: Question & Answer
Question: What are the methods or ways to encrypt and decrypt data, seen as a recipe or set of instructions for the cryptographic process?
Answer: Cryptographic Algorithms
Type: True/False
Question: The strength and security of an algorithm are determined by its ability to withstand cryptoanalysis and attacks without being fundamentally flawed.
Answer: True
Type: Question & Answer
Question: What is a set of strings of bits that are used by algorithms to transform data, making the encrypted data unique?
Answer: Cryptographic Keys
Type: True/False
Question: The security of encrypted data is directly tied to the length and randomness of the key.
Answer: True
Type: Question & Answer
Question: What type of cypher encrypts data in fixed-size blocks (e.g., AES operates on 128-bit blocks)?
Answer: Block Cyphers
Type: True/False
Question: Block cyphers are suitable for processing large amounts of data.
Answer: True
Type: Question & Answer
Question: What type of cypher encrypts data one bit or byte at a time, often used where data arrives in a stream (e.g., RC4)?
Answer: Stream Cyphers
Type: Question & Answer
Question: What type of cipher involves replacing each letter in the plaintext with another letter shifted a certain number of places up or down the alphabet?
Answer: Substitution Cipher (e.g., Caesar Cipher)
Type: True/False
Question: RC4 is an example of a stream cypher, but is now seen as insecure.
Answer: True
Type: Question & Answer
Question: What type of cypher involves arranging the letters of the plaintext according to a certain system, altering their order but not the actual letters?
Answer: Transposition Cypher
Type: Question & Answer
Question: What technique enhances the security of passwords or other cryptographic keys by transforming a relatively weak key into a stronger, more attack-resistant one?
Answer: Key Stretching
Type: True/False
Question: Key stretching involves applying a cryptographic hash function to the original key with additional data (salting), making it resource-intensive.
Answer: True
Type: Question & Answer
Question: What type of cryptographic algorithm uses the same single key for both encryption and decryption?
Answer: Symmetric Key Algorithms
Type: True/False
Question: Key sharing in symmetric encryption requires the key to be shared and kept secret between parties.
Answer: True
Type: True/False
Question: Symmetric Key Algorithms are generally faster and more efficient than Asymmetric Key Algorithms.
Answer: True
Type: Multiple Choice Question (Select ONE answer)
Question: A major challenge with symmetric cryptography, especially in large networks or systems, is:
A) Computational intensity
B) Key management
C) Lack of strong algorithms
D) Inability to encrypt data in transit
Answer: B) Key management