12 Flashcards
What are the characteristic features of Elliptic Curve Cryptography (ECC)? (Select 3 answers)
- Asymmetric encryption
- Low processing power requirements
- Suitable for small wireless devices
Which of the following answers refers to a solution designed to strengthen the security of session keys?
PFS (Perfect Forward Secrecy).
PFS is a cryptographic technique that enhances the security of session keys by ensuring that even if a long-term secret key is compromised, it cannot be used to decrypt past or future communication sessions. This adds an extra layer of security to protect sensitive data.
An emerging field of advanced computing technologies based on the principles of physics is known as:
** Quantum computing **
Quantum computing is a rapidly-emerging technology that harnesses the laws of quantum mechanics to solve problems too complex for classical computers.
According to predictions, the most future-proof cryptographic solution should be:
** Post-quantum cryptography **
The goal of post-quantum cryptography (also called quantum-resistant cryptography) is to develop cryptographic systems that are secure against both quantum and classical computers, and can interoperate with existing communications protocols and networks
An asymmetric encryption key designed to be used only for a single session or transaction is known as:
** Ephemeral key **
asymmetric encryption key designed to be used only for a single session or transaction is Ephemeral key. Ephemeral keys are generated for temporary use and are typically used in secure communication protocols to provide forward secrecy, ensuring that the compromise of one session’s key does not compromise the security of past or future sessions.
What are the characteristic features of a session key? (Select 2 answers)
- Used during a single session
- Symmetric key
The term “Blockchain” refers to a decentralized digital ledger system (i.e. a specific type of a distributed database) stored across multiple computers in a P2P network.
True
Unlike stream ciphers which process data by encrypting individual bits, block ciphers divide data into separate fragments and encrypt each fragment separately.
True
Which of the following block cipher modes is the simplest/weakest and therefore not recommended for use?
** ECB **
ECB was originally designed to encrypt messages that never span more than a single block, such as to encrypt keys to distribute for other operations. However, using ECB on a message that’s longer than a single block results in the leak of a bit per block
Which of the block cipher modes listed below provides both data integrity and confidentiality?
** GCM **
Galois/Counter Mode (GCM) is a mode of operation for symmetric-key cryptographic block ciphers which is widely adopted for its performance.
Examples of techniques used for encrypting information include symmetric encryption (also called public-key encryption) and asymmetric encryption (also called secret-key encryption, or session-key encryption.)
False
A type of encryption scheme where the same key is used to encrypt and decrypt data is referred to as: (Select 3 answers)
- Session-key encryption
- Symmetric encryption
- Secret-key encryption
Symmetric encryption algorithms require large amounts of processing power for both encryption and decryption of data which makes them much slower in comparison to asymmetric encryption ciphers.
False
In asymmetric encryption, any message encrypted with the use of a public key can only be decrypted by applying the same algorithm and a matching private key (and vice versa).
True
Which of the algorithms listed below does not belong to the category of symmetric ciphers?
** RSA **
RSA is a type of asymmetric encryption, which uses two different but linked keys. In RSA cryptography, both the public and the private keys can encrypt a message. The opposite key from the one used to encrypt a message is used to decrypt it.