Week 6- Principles of cryptography: fundamentals and symmetric systems Flashcards

(29 cards)

1
Q

What is Cryptology?

A

the science of secure communications

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

what is cryptanalysis?

A

the study of encryption to detect vulnerabilities and propose cryptographic techniques.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

what is cryptography?

A

encode and decode information for secure communication.

achieves confidentiality and integrity of CIA triad.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

what is a block cipher?

A

a cryptographic method, data is broken into smaller blocks for encryption and decryption using a cryptographic key

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

what is a cryptographic key?

A

a numerical value that act as an input to encryption/decryption algorithm.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

what is AES?

A

advanced encryption standard.

symmetric block cypher used across the internet and wi-fi networks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Define Diffie-Hellman (DH)

A

a key exchange, mathematical algorithm whereby two entities can share a symmetric key remotely.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

what does Moore’s law predict?

A

that computer power and its ability to crack a code doubles every 18 months.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

define brute-force-attack

A

an exhaustive cryptanalytic method, attempts every possible key/password combination until on works.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

what is 3DES?

A

3 digital encryption standard

symmetric block cipher with key length 112 or 168 bits.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Define reverse engineering

A

using the output of a device/system to figure out how it works

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is a dictionary attack?

A

an attempt to break into a password protected system by using a list of well-known words or phrases.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

define digital signature

A

authenticating the authorship of a message

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

define digital certificate

A

proof of ownership of a public key

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

define public key

A

asymmetrical cryptographic key available to anyone

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Define web of trust

A

an arrangement of entities where there is a relationship of trust

17
Q

define plaintext

A

unencrypted information

18
Q

define ciphertext

A

encrypted information

19
Q

define a cipher or cryptographic algorithm

A

mathematics responsible for turning plaintext to ciphertext or reverting it back plaintext

20
Q

define encryption

A

the process of converting plaintext to ciphertext

21
Q

define cryptographic key

A

a numerical value with a string of bits of specific size used to encrypt or decrypt

22
Q

define encryption key

A

a cryptographic key, a piece of information used with an algorithm (cipher) to turn plaintext to ciphertext

(decryption key does the opposite)

23
Q

define symmetric cryptography

A

encryption and decryption use the same cryptographic key

24
Q

define asymmetric cryptography

A

encryption and decryption use different keys

25
define decryption
the act of taking a encrypted message and rendering it readable
26
ciphers can be categorised into 2 types, what are they?
**block cipher** divides plaintext into fixed lengths of bits (3DES) **stream cipher** a symmetric method, bits are encrypted one at a time for streaming audio/video
27
define initialisation vector
the value required in the generation of a block or stream cipher, should not be easily predicted
28
what is CSPRNG
cryptographically secure pseudo random number generator an algorithm that produces random numbers, may rely on environmental changes
29
what is stenography
The study of hiding information inside other information – often in a picture or audio file.