2.8 Summarize the basics of cryptographic concepts. Flashcards

1
Q

Non-repudiation

A

Verify who sent the information

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Authentication

A

Verify a user

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

integrity

A

verify the files was not edited or tampered with

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Plaintext

A

An unencrypted message

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Ciphertext

A

An encrypted message

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Cipher

A

The algorithm used to encrypt or decrypt the message

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Cryptanalysis

A

art of cracking encryption.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Cryptographic keys

A

Add the key to the cypher to encrypt
larger keys are more secure
some encryption methods use one key

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

what is the process of making a weak jey stronger by performing multiple processes on it. Like hashing a password and then hashing the hash,

A

Key stretching or key strengthening.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

bcrypt

A

generates hashes from passwords
An extension to Unix crypt library
Uses blowfish cipher to perform multiple rounds of hashing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

PBKDF2

A

Password-based key derivation function 2
- part of RSA public key cryptography standards (PKCS #5, RFC 2898

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Lightweight Cryptography

A

Usually used by IoT devices, since traditional cryptography requires a powerful CPU and lots of time, an IoT device does not have either.
NIST is leading an effort to create new standards on this and keep costs low for IoT devices.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

HE

A

Homomorphic Encryption -
- You can perform calculations of data while it is encrypted.
- You can perform the work directly on the encrypted data
- The encrypted data can only be viewed with the private key

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Symmetric encryption

A

It uses a single shared key to encrypt and decrypt. If the key is exposed, you will need a new key.
Very Fast to use.
Does not scale well. It can be challenging to distribute.
128-bit or larger are common
These keys get larger a time goes on

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Asymmetric encryption

A

Often referred to as public key cryptography.
Uses two or more mathematically related keys.

Private key - Kept private. No one else can see it.

Public key - Anyone can see this key. You should share it.

Once the public key has encrypted the data, it can only be decrypted using the private key pair.

Larger keys than symmetric keys.
Complex calculations of prime numbers
Common to see key lengths of 3072 or larger

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

How does the Key pair get generated?

A
  • Builds both public and private key at the same time
    Lots of randomization
    Large prime numbers and lots of math
17
Q

How can you create a symmetric key without sending the symmetric key over the network?

A

You use the asymmetric keys that you created to create a symmetric key. You would exchange public keys with the person you want to talk to and then use the other person’s public key and combine it with your private key to create a symmetric key.

Bobs private key + Sues public key
Sues private key + Bobs public key

Both of these create the same symmetric key, which can then be used to communicate.

18
Q

ECC

A

Elliptic Curve cryptography
Instead of numbers, use curves.
- uses smaller keys than non-ECC asymmetric encryption
- Smaller storage and transmission requirements
- Perfect for mobile devices and IoT devices

19
Q

Hash

A

Represents data as a short string of text, sometimes referred to as a message digest, a fingerprint.
This is a one-way trip; you cannot recover the original message from the digest
Perfect for strong passwords
Perfect for verifying downloads and verifying file integrity.
Can be a digital signature - authentication, non-repudiation, and integrity
Will not have a collision

20
Q

Sha256

A

Hashing algorithm
256 bits/ 64 hex

21
Q

When a hash of two different inputs creates the same outputs

A

A collision.
MD5 has a collision found in 1996
Don’t use MD5 to hash.

22
Q

Digital signatures

A

Prove the message was not changed (Integrity)
Prove the source of the message (Authentication)
Make sure the signature is not fake. (non-repudiation)
Signed with the private key.
Verified by using the public key.

23
Q

Out-of-band key exchange

A

Sends it out side of the internet.
Telephone, courier, person, etc.

24
Q

In-band key exchange

A

it’s on the network
protect key with additional encryption
Use asymmetric encryption to deliver a symmetric key.

25
Q

PFS

A

Perfect forward secrecy
Used in SSL/TLS when communicating to a web server.
Does not use the servers private RSA key
Uses Elliptic curve or Diffie hellman ephemeral (ECDHE)- used to transfer data in 1 session.
The session keys aren’t kept around.
Requires more computing power
not all servers choose to use PFS
Browser must support PFS

26
Q

Steganography

A

Hiding information in an image
Storing information in audio files
Can do the same thing in a video file.
Security through obscurity

27
Q

Obfuscation

A

Process of making something unclear
Commonly used in source code.

28
Q

stream ciphers

A

encryption is done one byte or bit at a time
high speed, low hardware complexity
Used with symmetric encryption typically
Not commonly used with asymmetric encryption
The starting state should never be the same
- key is often combined with an initialization vector (IV)

29
Q

Block Ciphers

A

Encrypts fixed length groups at one time often in 64bit or 128 bit block
Pads added to short blocks
Each block is encrypted or decrypted independently
Symmetric encryption
- similar to stream ciphers
block cipher modes of operations:
- Avoids patterns in the encryption
- Many different modes to choose from

30
Q

ECB

A

Electronic codebook
A block cipher mode of operation
The simplest encryption mode
too simple for most use cases
Each block is encrypted with the same key
- identical plaintext blocks create identical ciphertext blocks

31
Q

CDC

A

cipher block chaining, cipher block mode
Adds randomizations which gets around problem with ECB.
Easy to implement
Each plaintext block is XORED with previous ciphertext block
uses IV for the first block

32
Q

CTR

A

Counter
Block cipher mode uses an incremental counter to add randomization.

33
Q

blockchain

A

a distributed ledger
keeps tracks of transactions
Everyone on the block chain network maintain the ledger

34
Q

3DES

A

3DES uses 64-bit blocks and a 56-bit key, but the plaintext is encrypted three times using different subkeys. 3DES is also a block cipher. Symmetric keys.

35
Q

RC4

A

Stream cipher.