2.8 Flashcards

Summarize the basics of cryptographic concepts.

1
Q

Is a cryptographic implementation designed to demonstrate authenticity and identity associated with a message.

A

Digital signatures

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

As a general rule, a longer key length is more secure, but also will take longer to compute.

A

Key length

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Is a mechanism that takes what would be weak keys and “stretches” them to make the system more secure against brute force attacks.

A

Key stretching

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

The level of randomness.

A

Entropy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Refers to the process of adding random data to plaintext before it is hashed. This technique is commonly used in password hashing to enhance security and mitigate various attacks.

A

Salting

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Is a special mathematical function that performs one-way encryption, which means that once the algorithm is processed, there is no feasible way to use the ciphertext to retrieve the plaintext that was used to generate it.

A

Hashing function

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Is a fundamental concept in cryptography that involves securely establishing a shared secret key between two parties over an insecure communication channel. This shared key can then be used to encrypt and decrypt messages exchanged between the parties, ensuring confidentiality and integrity of communication.

A

Key exchange

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Is a branch of public key cryptography that relies on the algebraic structure of elliptic curves over finite fields to provide security functions. It is widely used for secure communication, digital signatures, and encryption.

A

Elliptic-curve cryptography (ECC)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Is a property of a public key system in which a key derived from another key is not compromised, even if the originating key is compromised in the future.

A

Perfect forward secrecy (PFS)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Is the use of quantum computing hardware to perform encryption and decryption processes.

A

Quantum Cryptography

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Are cryptographic keys that are used only once after generation.

A

Ephemeral keys

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

In symmetric or block encryption, there is a need to deal with multiple blocks of identical data to prevent multiple blocks of ciphertext that would identify the blocks of identical input data. There are multiple methods of dealing with this. The basic premise is to use some source of entropy before encrypting subsequent blocks so that identical blocks of plaintext produce differing blocks of ciphertext. These modes can be broken into three groups: authenticated, unauthenticated, and counter.

A

Modes of operation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Is a form of encryption designed to provide both confidentiality and authenticity services.

A

Authenticated

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

is a cryptographic process where data is encrypted to ensure its confidentiality but lacks mechanisms for verifying the integrity or authenticity of the encrypted data.

A

Unauthenticated

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Is a block cipher mode of operation used in symmetric encryption algorithms to provide confidentiality for data. It transforms a block cipher into a stream cipher, allowing encryption of plaintext data of arbitrary length. Is widely used in various cryptographic applications due to its simplicity, efficiency, and parallelizability.

A

Counter

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Are lists of records, where each addition to the list is done by a cryptographic algorithm.

A

Blockchains

17
Q

Are distributed and decentralized databases that store a continuously growing list of records, called blocks, which are linked and secured using cryptographic techniques. These ledgers are publicly accessible and transparent, allowing anyone to view, verify, and audit the transactions recorded on the blockchain.

A

Public ledgers

18
Q

A set of algorithms used together in cryptography.

A

Cipher suites

19
Q

Operate on streams of data instead of blocks. A _________ cipher encrypts plaintext one byte at a time.

A

Stream ciphers

20
Q

Operate on input data in a series of blocks. A _____________ cipher encrypts plaintext one block at a time.

A

Block ciphers

21
Q

__________________ tends to be faster, is less computationally involved, and is better for bulk transfers. But it suffers from a key management problem in that keys must be protected from authorized parties. Uses one key, and it is faster but less secure.

A

Symmetric encryption

22
Q

__________________ resolve the key secrecy issue with public keys, but they add significant computational complexity, which makes them less suited for bulk encryption. Uses two keys, and it is slower but more secure.

A

Asymmetric encryption

23
Q

Is a specialized suite of cryptographic algorithms designed to operate in a resource-constrained environment.

A

Lightweight cryptography

24
Q

Is the practice of concealing secret information within non-secret data in such a way that the existence of the hidden information is not apparent to observers.

A

Steganography

25
Q

Is a set of algorithms that allows operations to be conducted on encrypted data, without decrypting and re-encrypting.

A

Homomorphic encryption