Test Flashcards

(41 cards)

1
Q

Key people behind RSA

A

Ron Rivest, Adi Shamir, and Leonard Adleman

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

RSA was publicly described the algorithm in

A

1977

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Applications and use cases of rsa

A
  1. Digital Signatures
  2. Digital Certificates
  3. Secure Communication Protocols
  4. Secure Key Exchange
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Blowfish designed by (name) in (year)

A

Bruce Schneier
1993

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Blowfish have (number) of bit

A

64-bit

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

It is significantly faster than DES and provides a good encryption rate with no effective cryptanalysis technique found to date.

A

Blowfish Key Exchange

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

The Blowfish encryption algorithm is suitable for use in scenarios where a fast, secure, and freely available encryption technique is needed. Some common use cases include:

A
  1. Data Encryption
  2. Network Security
  3. Software Protection
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Blowfish PROS

A

Fast
Resilient
Open

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Blowfish CONS

A

Blocksize

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

3DES SECURITY FEATURES:

A
  1. Triple DES ( 3 DES) is a symmetric encryption algorithm based on the Data Encryption Standard ( DES).
  2. It uses three successive DES operations ( encrypt- decrypt- encrypt) to achieve enhanced security.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

3DES KEY SECURITY ASPECTS:

A
  1. Key Length: Uses three 56 - bit keys ( 168 bits total) for encryption, making brute- force attacks computationally infeasible.
  2. Key Variability: Offers keying options ( e. g., all three keys are independent or two keys are the same) to adapt to different security requirements.
  3. Block Size: Operates on 64 - bit blocks, which provides a larger data block size compared to DES.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

ADVANTAGE OF TRIPLE DES:

A
  1. Robust Security: Provides a higher level of security compared to single DES due to the triple encryption process.
  2. Backward Compatibility: Maintains compatibility with existing DES implementations and infrastructure.
  3. Widely Adopted: Still widely used in legacy systems and environments where stronger encryption standards are required.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

DES stands for

A

Data Encryption Standard

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

DES algorithm uses a key of

A

56-bit size

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

DES is a block cipher with (number) rounds of (Name) structure

A

16
Feistel

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

In 2002, it was overthrown by AES, which became the new standard following a public competition.

A

DES (Data Encryption Standard)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

The AES Encryption algorithm also
known as the

A

Rijndael algorithm

18
Q

AES is a symmetric block ciper algorithm with a block/chunk size of

19
Q

features of AES

A
  1. SP NETWORK
  2. KEY EXPANSION
  3. BYTE DATA
  4. KEY LENGTH
20
Q

It works on an SP network structure rather than a Feistel cipher
structure, as seen in the case of the DES algorithm.

A

SP NETWORK (feature of AES)

21
Q

It takes a single key up during the first stage, which is later
expanded to multiple keys used in individual rounds.

A

KEY EXPANSION (feature of AES)

22
Q

The AES encryption algorithm does operations on byte data
instead of bit data. So it treats the 128-bit block size as 16 bytes
during the encryption procedure.

A

BYTE DATA (feature of AES)

23
Q

The number of rounds to be carried out depends on the length of the key being used to encrypt data. The 128-bit key size has ten rounds, the 192-bit 04 key size has 12 rounds, and the 256-bit key size has 14 rounds.

A

KEY LENGTH (feature of AES)

24
Q

4 STEPS OF AES ENCRYPTION
ALGORITHM

A
  1. Sub Bytes
  2. Shift Rows
  3. Mix Columns
  4. Add Round Key
25
Operates on the state array by first converting each byte into its hexadecimal representation.
SubByte (steps of aes algorithm)
26
Performs a cyclic shift on the last three rows of a state matrix.
ShiftRows (steps in aes algorithm)
27
Operates by multiplying a constant matrix with each column in the current state array.
Mix Columns (steps in aes algorithm)
28
The algorithm performs a bitwise XOR operation between the current state array, obtained from the prior step, and a key specific to the current round.
Add Round Key (steps in aes algorithm)
29
A cryptographic protocol that allows two parties to establish a shared secret key over an insecure communication channel.
Diffie-Hellman key exchange
30
Why cryptography protocols are needed for secure communication?
1. Confidentiality 2. Integrity 3. Authentication 4. Non-repudiation 5. Key exchange
31
Diffie Hellman Key Exchange was invented by (name) and (name) in (year)
Whitfield Diffie and Martin Hellman in 1976
32
Key Exchange Process
1. Parameter Selection 2. Private Key Generation 3. Public Key Computation 4. Public Key Exchange 5. Shared Secret Key Computation 6. Shared Secret Key
33
Security Features of Diffie Hellman Key exchange
1. Perfect Forward Secrecy 2. Protection Against Eavesdropping 3. Key Exchanged without Pre-shared keys 4. Resistance to Man-in-the-Middle Attacks 5. Computational Complexity 6. Flexibility
34
Applications of Diffie - Hellman
* Secure Communication * Key Establishment for Symmetric Encryption * VPN (Virtual Private Network) Protocols * SSH (Secure Shell) Protocol * Wireless Communication Security * Digital Signatures and Key Agreement * Secure Messaging Protocols
35
Diffie Hellman Key Exchange Limitations
* Man-in-the-middle attacks * Vulnerabilities in specific implementations * Forward Secrecy
36
Who invented Hill Cipher and in what year
Lester S. Hill 1929
37
First polygraphic cipher
Hill Cipher
38
Polygraphic substitution cipher based on linear algebra
Hill Cipher
39
Each letter is represented by modulo 26
Hill Cipher
40
Advantage of Hill Cipher
* Perfectly conceals single-letter frequencies * Easily solvable when dealing with 2x2 matrices * Useful when hiding a single-letter or two-letter frequency information * High diffusion and strong tamper resistance without detection * It can withstand any attack, except if the attack is through a known plaintext
41
Disadvantages of Hill Cipher
* Vulnerable to know-plaintext attacks * A simple 2x2 matrix is quite simple. Still, when it expands, the calculations to encrypt or decrypt the data become much more complex, requiring a deep understanding of higher mathematics