2.8 Summarize the basics of cryptographic concepts Flashcards

1
Q

Digital signatures

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Key length

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Key stretching

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Salting

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Hashing

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Key exchange

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Elliptic-curve cryptography

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Perfect forward secrecy

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Quantum
-Communications

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Quantum
-Computing

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Post-quantum

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Ephemeral

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Modes of operation
-Authentication

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Modes of operation
-Unauthentication

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Modes of operation
-Counter

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Blockchain
-Public ledgers

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Cipher suites
-Stream

18
Q

Cipher suites
-Block

19
Q

Symmetric vs asymmetric

20
Q

Lightweight cryptography

21
Q

Steganography
-Audio

22
Q

Steganography
-Video

23
Q

Steganography
-Image

24
Q

Homomorphic encryption

25
Q

Common use cases
-Low power devices

26
Q

Common use cases
-Low latency

27
Q

Common use cases
-High resiliency

28
Q

Common use cases
-Supporting confidentiality

29
Q

Common use cases
-Supporting integrity

30
Q

Common use cases
-Supporting obfuscation

31
Q

Common use cases
-Supporting authentication

32
Q

Common use cases
-Supporting non-repudiation

33
Q

Limitations
-Speed

34
Q

Limitations
-Size

35
Q

Limitations
-Weak keys

36
Q

Limitations
-Time

37
Q

Limitations
-Longevity

38
Q

Limitations
-Predictability

39
Q

Limitations
-Reuse

40
Q

Limitations
-Entropy

41
Q

Limitations
-Computational overheads

42
Q

Limitations
-Resource vs security constraints