3.2 Cryptography Flashcards

1
Q

Cryptography protects _________ and _____ of data in daily transactions. Where is it used? 3 things -

A

confidentiality; integrity.
It’s used in cell phones, email, online shopping, etc.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Caesar cipher does what? It’s a classic _________ cipher.

A

shifts alphabet letters, typically by 3 spaces.
-substitution

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is the difference between a block and a stream cipher?

A

block encrypts chunks of data at at a time. can render large portions unusable.
stream encrypts bit by bit. better for files of variable lengths, like streaming video where size can change.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

ECC is classified as which type of cryptographic algorithm?

A

single algorithm; fast and efficient - uses less process power and memory, good for cell phones or portables. Uses short keys while maintaining higher strength. Asymmetrical Key Algorithm.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is the key point of Kerckhoffs’s second principle?

A

“The system must not require secrecy; even if stolen by the enemy, system should remain secure.” Remains a key tenet of modern crypto algorithms. System should be robust so if people know all of the encrpytion process except for the key, they shouldn’t be able to break.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is a substitution cipher?

A

Substitutes each letter in the alphabet with another one.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What are the main differences between symmetric and asymmetric key cryptography?

A

symmetric uses single key for encryption and decryption. Sender and receiver have the same key. Much more efficient at encrypting large amounts of data than asymmetric.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

How does public key cryptography work?

A

Public key cryptography, or asymmetric cryptography, uses a pair of keys: a public key, which can be shared, and a private key, which must be kept secret.

  1. Key Generation: Each user creates a public-private key pair.
  2. Encryption: A sender encrypts a message using the recipient’s public key, ensuring only the recipient can decrypt it with their private key.
  3. Decryption: The recipient uses their private key to decrypt the message.
  4. Digital Signatures: A sender can sign a message with their private key, allowing others to verify it with their public key, ensuring authenticity.
  5. Key Exchange: It facilitates secure key exchange over insecure channels.

The security relies on the difficulty of specific mathematical problems, making it hard for attackers to deduce the private key from the public key.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Explain how 3DES differs from DES.

A

-DES used back into the 1970
s - have been comprimised.
-3 DES encrypted DES 3 times.= however it consumed a lot of processor power and memory and was replaced by AES.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Try to decrypt this message using the information in this chapter: V qb abg srne pbzchgref. V srne gur ynpx bs gurz. —Vfnnp Nfvzbi.

A

I do not fear computers. I fear of

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

How is physical security important when discussing the cryptographic security of data?

A

Protects security at rest and is a layer of defense. Also in motion as a thumb drive can be stolen and exploited.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Core Features of Cryptography are? 4-

A

o Confidentiality: Prevents unauthorized disclosure of data
o Integrity: Ensure data isn’t modified
o Authentication: Used to validate sender with digital signatures
o Non-repudiation: Digital signatures also ensure non-repudiation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is Plain Text

A

o An unencrypted message

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q
  • Cipher Text
A

o An encrypted message

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is Cipher

A

o The encryption algorithm used to encrypt & decrypt the message

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is Key?

A

Determines the output of the cipher algorithm and is needed to encrypt and
decrypt a message

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

What are some downfalls of symmetric (private key Encrytion)

A

-The downside of symmetrical encryption is that it makes it hard to initiate communication
the first time. (exchanging them)
- If attacker gets hold of key, they can open any encrypted email you’ve sent. (storing them)
-The SAME Key is used for both encryption and decryption.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

What is the Official Encryption standard of the U.S. Federal Government?

A

AES - Advanced Encryption Standard

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

How long to break a 128-Bit AES by brute force?

A

Billions of Years

20
Q

_________ encryption uses two keys, a ________and a ______ created as a matched pair.

A
  • Asymmetric encryption uses two keys, a public key and a private key created
    as a matched pair.
    o Private Key: Kept secret and never shared.
    o Public Key: Shared with others.
21
Q

What is Asymmetric (public key) Encryption also know as?

A

Commonly referred to as:
o Public Key Encryption
o Public Key Infrastructure (PKI) Encryption

22
Q

What does Public Key Encrption(Asymmetric) Provide when sending using a private key?

A

Confidentiality - NO, because he is possibly sharing his public key with many people.
1- Authentication - only one who could encrypt is bob
2- Non-repudiation -
3- Integrity - (if used with hashng)

23
Q

When receiving a public key encryption (a reply) back from a person what is provided?

What part of the CIA triad?

A

Confidentiality - because once encrypted, only person who can open it is Bob, the original encryptor

24
Q

Describe “security through obscurity”. What is the opposite of it?

A

a devices strength was that the equipment and settings were secret for specific messages. example, Enigma. -
Opposite is Kerckhoffs second principle “….system shouldn’t require secrecy”

25
Q

Whats a one way problem?

A

Easy to solve in one direction but difficult to perform in the other direction.

26
Q

Block and Stream Ciphers are symmetric or asymmetric?

A

Symmetric, they use a shared private key.

27
Q

What are Protocols.

A

Rules that define communication across devices.

28
Q

What is RSA?

A

Algorithm named after its creators, asymmetric used across the world including SSL protocol.

29
Q

Describe Hashing?

What part of the CIA triad does this ensure? What does this process veri

A

-process of converting data into a fixed-string of text
-Provides data INTEGRITY; each unique input will have unique output. Verifies something has not been tampered with. SHA/MD5 common algorithms.

30
Q

A ________ __________ allows you to sign a message so others can detect any changes to the message after its been sent.

A

Digital Signature.

31
Q

What asymmetrical algorithm related device can be used to determine nonrepudiation?

A

Digital Signatures.

32
Q

How does digital signature work?

A

digital signature Hashes an email. Private key encrypts the hash. Receiver’s public key decrypts the hash, ensuring message integrity and nothing was tampered from original message. usually happens in background of programs.

33
Q

How can you validate that a public key belongs to the proper owner? Also used as a form of electronic identification.

A

Digital Certificate

34
Q

What is a trusted agent that handles digital certificates called?

A

certificate authority; they issue certificates, a trusted third party on both sides of the transaction.

35
Q

What are the two main PKI components?

A

certificate authority and registration authority

36
Q

Digital signatures combine hashing and asymmetric encryption to provide _________ and ___________.

A

authentication; non-repudiation

37
Q

Full disk encryption and file encryption protect______ __ ______. Physical security measures are also important.

A

data at rest.

38
Q

______ _________ link public keys to identities. They’re issued and verified by certificate authorities.

A

Digital certificates

39
Q

_________ and _____ protect data in motion by encrypting network traffic

A

SSL/TLS; VPNs

40
Q

Protecting ____ __ _____ is challenging. Insider threats like Edward Snowden demonstrate the risks.

A

data in use

41
Q

Classify Security Principles and Actions According to Types of Attacks They Mitigate or Eliminate. Encryption, Digital Signatures, Hash Functions

A
  • Encryption: Mitigates data interception and unauthorized access.
  • Digital Signatures: Eliminate forgery and ensure nonrepudiation.
  • Hash Functions: Mitigate data tampering.
42
Q

Categorize Types of Cryptography Tools According to the Leg of the CIA Triad They Enforce
1. Symmetric/Asymmetic
2. HAsh Functions
3. Digital Sig/Certs

A
  • Symmetric and Asymmetric Cryptography: Enforce confidentiality.
  • Hash Functions: Enforce integrity.
  • Digital Signatures and Certificates: Enforce both integrity and nonrepudiation.
43
Q

Classify Security Principles and Actions According to Types of Attacks They Mitigate or Eliminate:
1. Data Encryption:
2. Firewalls: 3. Multi-factor Authentication

A

 Data Encryption: Mitigates data interception.
 Firewalls: Prevent modification and interception.
 Multi-factor Authentication: Eliminates unauthorized access.

44
Q

What other protocols does SSL and TLS work with? What does SSL and TLS stand for? What does this protect exactly?

A

SSL-Secure Sprockets Layer
TLS- Transport Layer Security
Work in conjunction with IMAP, POP, HTTPS, VOIP to protect voice messages and instant messaging. Protects the data on the server but not the connection itself.

45
Q

How do you protect the data in motion

A

VPN

46
Q

What are the two common types of VPNs?

A

IP(sec) - Internet Protocol Security and SSL. SSL is more lightweight however can be downloaded to a public computer therefore provide avenue for data leak or attack.

47
Q

How do we protect Data in use?

A

difficult to do while people are accessing files. Edward Snowden is a good example of what can happen.