3 - 1: Encryption Flashcards

1
Q

What is cryptography?

A

The use of mathematical algorithms to transform information into an encrypted form not readable by others

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What two functions comprise cryptography?

A

Encryption - converts plaintext to ciphertext, Decryption - conversion from ciphertext back to plaintext

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What are algorithms

A

Mathematical instructions, similar to a recipe

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Decryption relies on what two inputs?

A

1) Ciphertext and 2) decryption key

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Symmetric Encryption algorithms

A

Encryption and decryption both use the same key (shared secret)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Asymmetric Encryption algorithms

A

Encryption and decryption have different keys, which are paired (public key)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Formula to compute the amount of symmetric keys needed

A

n(n - 1) / 2 , where n is the amount of people who wish to communicate

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What keys would you have in an Asymmetric algorithm?

A

Public key given to partners, and private key kept secret

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

To encrypt or decrypt from asymmetric cryptography, remember to use keys that are:

A

from the same pair

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Although slower, asymmetric cryptography provides what benefit?

A

Requires far fewer keys in organizations

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What are the 5 goals of cryptography?

A

Confidentiality, Integrity, Authentication, Obfuscation, Non-repudiation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Codes

A

A system that substitutes one word or meaningful phrase for another to provide secrecy and/or efficiency

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Ciphers

A

A system of mathematical algorithms to encrypt and decrypt messages

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Stream ciphers

A

Operate on one character or bit of a message at a time

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Block ciphers

A

Operate on a chunk of characters at a time

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Substitution ciphers

A

Change the characters in a message

17
Q

Transposition ciphers

A

Scramble or rearrange characters in a message

18
Q

Exclusive Or

A

Logical operation which is true when 1 and only 1 of the inputs is true

19
Q

Confusion

A

Hiding the association ciphertext and the key. Every bit of ciphertext relies on more than 1 bit of the key

20
Q

Diffusion

A

Changing a single bit of plaintext should change about 50% of the ciphertext bits

21
Q

Obfuscation

A

Cryptography to hide source code from users

22
Q

One-time Pad

A

Unbreakable; sender and receiver have identical pads, key is at least as long as the message, has no repetition as long as the pad is used once

23
Q

Lifecycle approach

A

1) initiation, 2) acquire, 3) implement and assess, 4) operation and maintenance, 5) sunset