2.8 Flashcards

1
Q

Cryptography

A

Authentication and access control
Confidentiality
Nonrepudiation
Integrity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Cryptananalysis

A

Cracking encryption

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Cryptography keys

A

Added to encryption but its best to use biggest kep but sometime cant. So sometimes can hash the hashes password.. known as key stretching

There are libraries for key stretching bcrypt cypher or pbkdf2

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Cryptography lightweight

A

Iot concepts, where crpytography uses least amount of power

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Homomorphic encrpyrion

A

can perform
Calculations in encrypted form and saved in always encrypted form

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Symmetric encryption

A

1 key to decrypt and same key to encrypt, shared secret key

Cant scale, like someone carrying a key cant share one person carries

Th

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Asymmetric encryption

A

Have a public key and private key, can give to anyone share etc. only way to decrypt is with private key

So one key has one way

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

The key pair

A

Asymmetric key generator creates two separate keys one is public to be shared and private stays with us

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Elliptic curve cryptography

A

Instead of numbers we use cirves to create keys, using smaller keys and use less storage and data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Hashes

A

Message digest, a finger print, a one way trip that cant be undone can be used to store passwords

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

How to share keys privately

A

Out of band exchange, like telephone
Transit encryption like asymmetric to send symmetric

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Perfect
Forward secrecy

A

Different encryption when keys are transfer for one session, to protect and make sure multi node travel doesnt show the same key

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Steganography

A

Hide writing in an image, secirty through obscurity. The graphic is cover text.

Can do audio or video too

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Quantum computing

A

Not upgrade but to add
Value, a new way to make calculations. Instead of bits we use qubits, that exist between 1 and zero and is both

Scalability is advantage

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Quatum key distribution,

A

Sent keys in traffic with out worry cause its qubits

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Stream cipher vs block kcupher

A

Stream, encrypt one but at a tome and store one byte at a time with symmetric encryption initialization vector is added as salt

Block, one block of encryption at a time and padding is added to make sure it fits 64 or 128 bits.

17
Q

Ecb cbc ctr

A

Electronic codebook Simplest encryption mode once block until all blocks are encrytpted

Cypher block chaining easy to implement using Xored adds more randomization or initialization vector

Counter mode, starts with counter and encrypts and each block is encrpyted based on the counter

18
Q

Blockchain

A

A distributed ledger for records or replicates for everyone to see, includes payment processing digital id, supply chain monitoring etc

19
Q

Cryptography limitations

A

Speed needs to perform quick enough with the encrypt and decrypt process

Size with block cipher, bytes need
To be padded From 8 to 16 bytes if needed

Weak keys, smaller keys are weaker unless double hashed

Longevity make sure keys aren’t. Outdated

Predictability and entropy, randomization

Key reuse, can be danger but saves on resources

Resources vs security constraints