Untitled Deck Flashcards

(37 cards)

1
Q

What is Decryption?

A

Changing secret message back to original form

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is Plaintext?

A

Unencrypted data to be encrypted or is the output of decryption

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is Ciphertext?

A

The scrambled and unreadable output of encryption

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is a Pseudorandom number generator (PRNG)?

A

An algorithm for creating a sequence of numbers whose properties approximate those of a random number

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is Diffusion?

A

If a single character of plaintext is changed then it should result in multiple characters of the ciphertext changing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is Confusion?

A

The key does not relate in a simple way to the ciphertext

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is Confidentiality?

A

Ensures only authorized parties can view it

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is Integrity?

A

Ensures information is correct and unaltered

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is Authentication?

A

Ensures sender can be verified through cryptography

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is Non-repudiation?

A

Proves that a user performed an action

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is Obfuscation?

A

Making something obscure or unclear

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is Security through obscurity?

A

An approach in security where virtually any system can be made secure as long as outsiders are unaware of it or how it functions

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is Data-at-rest?

A

Data that is stored on electronic media

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is Data-in-transit?

A

Actions that transmit the data across a network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is Data-in-use?

A

Data actions being performed by ‘endpoint devices’, such as printing a report from a desktop computer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What are Low-power devices?

A

Small electronic devices that consume very small amounts of power

17
Q

What is Resource vs security constraint?

A

A limitation in providing strong cryptography due to the tug of war between available resources (time and energy) and the security provided by cryptography

18
Q

What is High Resiliency?

A

The ability to quickly recover from these resource vs. security constraints

19
Q

What is a Stream cipher?

A

Takes one character and replaces it with another

20
Q

What is a Block cipher?

A

Manipulates an entire block of plaintext at one time

21
Q

What is a Sponge function?

A

Takes as input a string of any length and returns a string of any requested variable length

22
Q

What is a Hash?

A

An algorithm that creates a unique digital fingerprint called a ‘digest’

23
Q

What is an Asymmetric Cryptographic Algorithm?

A

Cryptography that uses two mathematically related keys.

24
Q

What is a Symmetric cryptographic algorithm?

A

Encryption that uses a single key to encrypt and decrypt a message

25
What is Fixed size in hashing?
Short and long data sets have the same size hash
26
What does Unique mean in hashing?
Two different data sets cannot produce the same hash
27
What does Original mean in hashing?
Data set cannot be created to have a predefined hash
28
What does Secure mean in hashing?
Resulting hash cannot be reversed to determine original plaintext
29
What is Message Digest 5 (MD5)?
A revision of MD4 that was designed to address MD4's weakness
30
What is Secure Hash Algorithm (SHA)?
A secure hash algorithm that creates more secure hash values than Message Digest (MD) algorithms
31
What is Cryptography?
Cryptography is scrambling information so it's not able to be read. It transforms information into secure form so unauthorized people can't access it.
32
What is Steganography?
Hides the existence of data
33
What is Encryption?
Changing original text into a secret message using cryptography
34
What is Cleartext data?
Data stored or transmitted without encryption
35
What is a Key in cryptography?
A mathematical value entered into the algorithm to produce ciphertext
36
What is a Substitution cipher?
Substitutes one character for another
37
What is an XOR cipher?
Based on the binary operation eXclusive OR that compares two bits