#33 Flashcards

1
Q

What uses many layers of varying security mechanisms to frustrate attackers?

A

Defense in depth

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

One of the most common forms of computer security?

A

Cryptography

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

The word cryptography comes from roots ‘crypto’ and ‘graphy’ roughly translating to what?

A

Secret writing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

In order to make information a secret you use what?

A

Cipher

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is an algorithm that converts plain text into cipher text, which is gibberish unless you have a key that lets you undo the cipher?

A

Cipher

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

The process of making text secret

A

encryption

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

the reverse process of encryption

A

decryption

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Encryption and decryption are the same thing you just have to make sure the _________ and ________ machines have the same initial configuration.

A

sending and receiving

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Julius Caesar used what is now called a _______ _______, to encrypt private correspondence. He would shift the letters in a message forward by three places. To decipher the message, recipients had to know both the ________ and the _______ to shift by, which acted as the key.

A

Caesar Cipher

algorithm and number

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

The Caesar Cipher is one example of a larger class of techniques called substitution ciphers. These replace every letter in a message with something else according to a translation.

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

A skilled cryptanalyst can work backwards from these kinds of statistics to figure out the message.

A

Cryptanalyst

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Here we take a message and fill the letters into a grid. To encrypt the message you read out the characters in a different order. Example from the bottom left working upwards one column at a time. This is known as what?

A

Columnar transposition Cipher

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

New letter ordering is the encrypted message. This is what?

A

Permutation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

The ordering direction, as well as the 5 by 5 grid size serves as the what?

A

Key

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What was used by the nazis to encrypt their wartime communications?

A

German Enigma

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What was a typewriter like machine, with a keyboard and lapboard, both showing the full alphabet. Above that there was a series of configurable rotors that were the key to the Enigma’s encryption capability.

A

Enigma

17
Q

What device has one side with electrical contacts for all 26 letters. These connected to the other side of the rotor using cross-crossing wires that swapped one letter for another.

A

Enigma Rotor

18
Q

Letter swapping behavior is a what?

A

Substitution Cipher

19
Q

Following the rotors was a special circuit called? Instead of passing the signal onto another rotor, it connected every pin to another and sent the electrical signal back through the rotors.

A

Reflector

20
Q

There is a _________ at the front of the machine that allows letters coming form the keyboard to be optionally swapped, adding another level of complexity.

A

plugboard

21
Q

To prevent the ______ from being a simple;e substitution cipher, every single time a letter was entered the rotors advanced by one spot, sort of like an odometer in a car.

A

Enigma

22
Q

One of the earliest software ciphers to become widespread was the ________ _______ ______ developed by IBM and NSA in 1977.

A

Data Encryption Standard

23
Q

DES as it was known originally used ______ keys that were 56 bits long, which means that there are 2 to the 56 or about 72 quadrillion different keys.

A

Binary

24
Q

in 2001 the ________ _______ _______ was finalized and published. AES if designed to use much bigger keys 128,192,256 bits in size making brute force attacks much harder.

A

Advanced Encryption Standard

25
Q

AES chops data up into _____ _____ ___, and then applies a series of substitutions and permutations, based on the key values plus some other operations to obscure the message, this process is repeated ten or more times for each block.

A

16 byte-blocks

26
Q

AES balances performance and security to provide practical cryptography. Today, AES is used everywhere from encrypting files on iPhones and transmitting data over WIFI with WPA2 to accessing websites using HTTPS.

A

True

27
Q

The sender encrypts a message using a ___. and the recipient decrypts it using the same _____.

A

Key

28
Q

What is an algorithm that lets two computers agree on a ket without ever sending one. We can do this with one way functions- mathematical operations that are very easy to do in one direction but hard to reverse?

A

Key exchange

29
Q

Paint Colors as an analogy- easy to mix but not easy to figure out. Example of what?

A

Key Exchange

30
Q

The one way function is modular exponentiation. This means taking one number, the use, to the power of another number, the exponent, and taking the remainder when deciding by a third number, the modulus?

A

Diffie Hellman Key Exchange

31
Q

Diffie Hellman used to calculate a what?

A

Shared Key

32
Q

What are the keys that can be used by both sender and receiver to encrypt and decrypt messages. They are called this because the key is the same on both sides

A

Symmetric Keys

33
Q

The Caesar Cipher, Enigma and AES are all what?

A

Symmetric Keys

34
Q

What is when there are two different keys, often one is public and one is private?

A

Asymmetric encryption

35
Q

Knowing the public key only lets you encrypt because it is

A

Asymmetric

36
Q

Think about boxes with padlocks that you can open with a key. To receive a secure message, I can give sender a box and padlock and they put their message private key. After locking the box, neither the sender nor anyone else who finds the box can open it without brute force.

A

Asymmetric Encryption

37
Q

Where a server encrypts data using their private key. Anyone can decrypt it suing the server’s public key. This acts like an unforgivable signature, as only the owner using their private key, can encrypt it?

A

signing

38
Q

The most popular asymmetric encryption technique used today is RSA, named after its inventors; Rivest, Shamir, and Adleman

A

True

39
Q

The little lock icon that your computer has used public key cryptology to verify the server, key exchange to establish a secret temporary key, and symmetric encryption to protect all the back and fourth communication.

A

True