2.8 Basic Cryptographic Concepts Flashcards

1
Q

An unencrypted message (in the clear)

A

Plaintext

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

An encrypted message

A

Ciphertext

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

The algorithm used to encrypt/decrypt a message

A

Cipher

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

The art of cracking encryption

A

Cryptanalysis

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

True or false: Larger encryption keys are generally more secure.

A

true

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

True or false: All encryption methods only use a single key.

A

False

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

How can a small encryption key be used to make a stronger encryption?

A

Apply the key multiple times (stretching)

i.e. Hash a password. hash the hash. etc.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Applications designed to take small keys and perform repetitive hashing with them in order to create stronger hashes.

A

Stretching libraries

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

New standard of cryptography designed for IoT devices that have limited compute power.

A

Lightweight cryptography

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Encryption method intended to perform calculations on data while it is still encrypted. Assists with secure data stored in the cloud.

A

Homomorphic encryption (HE)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Encryption method that uses one single key for encryption and decryption. Does not scale well but is fast with little overhead.

A

Symmetric encryption

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Public key cryptography. Involves two or more mathematically related keys, one public and one private.

A

Asymmetric encryption

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

A form of asymmetric cryptography that uses large integers compose of two or more prime factors. Uses smaller keys and requires less storage. Good for mobile devices.

A

Elliptic curve cryptography

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Known as a message digest and is a short string of text that represents a set of data.

A

Hash

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is one way to use hashing to verify downloaded files from a website?

A

Compare the hash on your downloaded content to the hash on the website

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

True or false: When salting passwords, everybody gets a different salt stored with their password.

17
Q

Created using the private key and serves to prove that a piece of data was not changed, the source, and verify that it’s not fake

A

Digital signature

18
Q

True or false: Cryptographic algorithms are largely unknown entities

19
Q

Which encryption method has larger keys: symmetric or asymmetric?

A

Asymmetric

20
Q

What is a common length of key to see with asymmetric encryption?

A

3,072 bits or larger

21
Q

An encryption method that generates a session key on a server which allows a symmetric key to be sent via asymmetric encryption.

A

Real-time encryption

22
Q

Method of web traffic encryption that doesn’t use RSA keys. Uses elliptic curve or Diffie-Hellman and keys are not kept around. Requires more computing power and server/web browser must be compatible.

A

Perfect forward secrecy (PFS)

23
Q

The process of obscuring code in order to secure it.

A

Stenography

24
Q

Stenography technique which embeds messages into TCP packets.

A

Network Stenography

25
What is the goal of all the different stenography types (network, image, audio, watermarks, etc.)
Hiding a message within the given media
26
New type of computing that utlizes qubits as the smallest data form rather than bits with traditional computing.
Quantum computing
27
What are some tasks quantum computing can tackle?
Quickly searching/indexing large databases Simulating the quantum world (medical, weather, physics)
28
How does quantum computing break existing crytpography much quicker than traditional computing methods?
It can quickly factor prime numbers
29
This algorithm was created in 1994 to find prime factors of an integer N. Would take traditional computing longer than the age of the universe in order to solve.
Shor's Algorithm
30
A cryptosystem using lattice theory and relies on the "closest vector" problem.
NTRU
31
Cipher type: - Encryption is done one bit/byte at a time - Used with symmetric encryption - Starting state should never be the same twice (initialization vector)
Stream cipher
32
Cipher type: - fixed-length encryption groups - 64 or 128 bit blocks - Symmetric encryption
Block cipher
33
The simplest encryption mode where each block is encrypted with the same key every time. Identical plaintext blocks create identical ciphertext.
Electronic code book (ECB)
34
35
36
37