2.8 - Cryptographic Concepts Flashcards

1
Q

What is plaintext in cryptography?

A

An unencrypted message.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is ciphertext in cryptography?

A

An encrypted message.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is a cipher in cryptography?

A

The algorithm used to encrypt and/or decrypt.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is cryptanalysis in cryptography?

A

The art of cracking encryption.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is a key in cryptography?

A

What is added to the cipher to encrypt. It is also used to decrypt.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What are some ways to help make a weak key stronger?

A

1) Hashing
2) Key stretching
3) Key strengthening

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is key stretching?

A

Hashing passwords in a key.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is lightweight cryptography?

A

Cryptography that is focused on devices that have low power and low processing speed. Typically this is IoT devices.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is Homomorphic encryption (HE)?

A

Encryption that allows data to be worked with while it is encrypted. Calculations and research can be done on the data without actually viewing it.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is symmetric encryption?

A

Using a single, shared key to encrypt and decrypt the key. If the key gets out, it no longer is effective. It also known as the secret key algorithm.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What are some of the pros and cons of symmetric encryption?

A

Pros
1) Very fast

Cons
1) Doesn’t scale well

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is asymmetric encryption?

A

There are two (or more) mathematically related keys. There is a private key and a public key.

One of the keys is used to encrypt and the other is used to decrypt. Often, the private key is for decryption, and the public key is for encryption.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is the private key in asymmetric encryption?

A

The key that is kept private. It cannot be derived from the public key.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is the public key in asymmetric encryption?

A

The key that anyone can see. It cannot be derived from the private key.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

How can you create a symmetric key from asymmetric keys?

A

Combining the private key and public key on both sides.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What are some pros and cons of asymmetric encryption?

A

Pros:
1) Scalable
2) More secure

Cons:
1) High power and processing
2) Not as fast

17
Q

What is Elliptic curve cryptography (ECC)?

A

A key-based technique for encrypting data that generates security between key pairs for public key encryption by using the mathematics of elliptic curves. It uses smaller keys than non-ECC asymmetric encryption and has smaller storage and transmission requirements.

18
Q

What is a hash?

A

Represents data as a short string of text. It acts as a message digest. Hashing is a one-way trip. It is impossible to recover the original message from the digest.

It is used to store passwords and confidential information.

It can verify a downloaded document is the same as the original and it can act as a digital signature. Different messages will not have the same hash unless there is a collision.

19
Q

What is a collision in hashing?

A

When a hash is identical to another in a hashing algorithm. No hashing algorithm should create collisions.

20
Q

What is salt is hashing?

A

Random data added to a password when hashing to make it harder to break the algorithm. Every salt is different. It can’t completely stop reverse engineering.

21
Q

What are digital signatures?

A

A mathematical algorithm routinely used to validate the authenticity and integrity of a message.

The message is hashed then encrypted. When the hash is decrypted, the receiver takes the message and hashes it with the exact same algorithm to verify that it is the same value.

It is signed with the private key and verified with the public key.

22
Q

What do digital signatures do?

A

1) Prove the message was not changed (Integrity)
2) Prove the source of the message (Authentication)
3) Make sure the signature isn’t fake (Non-
repudiation)

23
Q

Between asymmetric and symmetric keys, which is often larger?

A

Symmetric keys are smaller (128-bit or larger)

Asymmetric keys are larger ( often 3,072 bits or more)

Larger keys are harder to brute force

24
Q

What are some considerations when exchanging keys?

A

Keys need to be secure when sent either in-band or out-of-band. Don’t send them over the net.

If in-band, send them with additional encryption.

25
Q

What is a session key?

A

A symmetric key that is sent using asymmetric encryptions. The receiver of the key unencrypts the symmetric key, and that becomes the session key.

They are often called ephemeral keys because they are supposed to be temporary.

26
Q

What is Perfect Forward Secrecy (PFS)?

A

It changes the method of key exchange to make sure that a different set of keys are used every time to prevent the a stolen key from compromising all communications.

PFS requires more computing power. Browser must support PFS.

27
Q

Define Steganography.

A

Hiding information inside of an image. The security is in the obscurity.

The covertext is the container document or file that contains the message.

28
Q

What are some common forms of steganography?

A

1) TCP packets
2) Image
3) Invisible Watermarks (yellow dots on printers)
4) Audio files
5) Video files

29
Q

What is a qubit in quantum computing?

A

The smallest form of information. They are zeros, ones, and any combination in-between, at the same time.

30
Q

What is a stream cipher?

A

Encryption that is done one bit or byte at a time.

High speed, low hardware complexity
Used with symmetric encryption

31
Q

What is a block cipher?

A

Encryption that is done in fixed-length groups (often 64-bits or 128-bits). Pad is added to short blocks. Each block is encrypted or decrypted independently.

Used on symmetric

32
Q

What is the mode of operation in block ciphers?

A

The method of encryption that is used, and it may provide a method of authentication.

ECB (Electronic Codebook)
Each block is encrypted in the exact way

CBC (Cipher Block Chaining)
Adds additional randomization and uses an initialization vector for the first block
Uses XOR

CTR (Counter)
GCM (Galois/ Counter Mode)

33
Q

What is a blockchain?

A

A system in which a record of transactions is maintained across computers that are linked in a peer-to-peer network.

34
Q

What can cryptography be used for?

A

Confidentiality
Integrity
Obfuscation
Authentication
Non-repudiation

35
Q

What are some of the limitations of cryptography?

A

1) Speed: need CPU and CPU needs power
2) Size: encrypting less than the minimum block size
could waste data
3) Weak keys: larger keys are harder to brute force
4) Time: Encryption and hashing takes time
5) Longevity: cryptographic tech becomes less secure
over time
6) Predictability and entropy: hardware random
number generators can be predictable
7) Key reuse: if key is compromised, everything using
that key is at risk
8) Resource vs. security constraints

36
Q
A