10.2 Asymmetric Encryption and Hashing Flashcards

1
Q

What is the disadvantages with symmetric key encryption?

These disadvantages can be addressed with ____________.

A
  1. As more individuals are included in the key exchange, there needs to be a key for each combination of individuals.
  2. As more individuals are included in the key exchange, a key must be created for each combination of individuals.

These disadvantages can be addressed with asymmetric key encryption

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

GPG is a command-line tool used to simplify the creation, encryption, and decryption of _________ key cryptography.

A

asymmetric

GPG is a command-line tool used to simplify the creation, encryption, and decryption of asymmetric key cryptography.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

__________ is a cryptographic method used to verify the integrity of data.

A

Hashing is a cryptographic method used to verify the integrity of data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Hashing takes plaintext and converts it to a message digest with an algorithm, and _______.

A

Hashing takes plaintext and converts it to a message digest with an algorithm, and no key

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Hashing is a _______ function, meaning it cannot be converted back to plaintext.

A

Hashing is a one-way function, meaning it cannot be converted back to plaintext.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Hashing algorithms output fixed lengths. Regardless of the input length, the output length is always ________.

A

Hashing algorithms output fixed lengths. Regardless of the input length, the output length is always the same.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Encryption’s main goal is _______. Hashing’s main goal is ________.

A

Encryption’s main goal is privacy. Hashing’s main goal is integrity.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Hashing Algorithims

SHA

A

Stands for Secure Hashing Algorithms, and includes its successors, SHA1 and SHA2.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Hashing Algorithims

SHA2

A

SHA2 has variations with different security strengths: SHA-256 and SHA-512

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Hashing Algorithims

MD

A

Stands for Message Digest and has several variations: MD2, MD4, and MD5

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Hashing Algorithims

LM and NTLM

A

Hashes used by Windows.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What algorithim would you use if you want to

A

SHA2/SHA-256

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Cryptography can also be used to validate authenticity using ___________.

A

Cryptography can also be used to validate authenticity using digital signatures

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

A ________ is a mathematical scheme

used to verify the authenticity of digital data.

A

digital signature

In the United States and several other countries, digital signatures are. considered legally binding.

Similar to asymmetric encryption, digital signatures also use public key cryptography.

However, digital signatures use public and private keys in reverse.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

When the message and the signataure are sent separately, that’s called a _________.

A

When the message and the signataure are sent separately, that’s called a detached signature.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Other digital signatures include (3):

A

All at once - A signature appended to an encrypted message.

Clearsigned - A signature appended to an unencrypted message

Signed Hash - Instead of signing a message, a hash is created first and the hash is signed for verification.