5) Cryptography Flashcards

1
Q

The act of scrambling plain text into cyphertext.

A

Encryption

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

(T/F) A strong hash function is designed so that a message cannot be forged that will result in the same hash as a legitimate message.

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

An encryption cipher that uses the same key to encrypt and decrypt.

A

Symmetric key

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

(T/F) Hashes provide confidentiality and integrity.

A

False

Hashes only provide integrity.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

An algorithm used for cryptographic purposes.

A

Cipher

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

___ corroborates the identity of an entity, whether it is the sender, the sender’s computer, some device, or some information.

A

Authentication

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

The science of keeping information secure.

A

Cryptography

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

The science of breaking through the encryption used to create the cyphertext.

A

Cryptanalysis

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

The overarching field of study that covers cryptography and cryptanalysis.

A

Cryptology

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

The specifics of the process used to encrypt the plaintext or decrypt the ciphertext.

A

Cryptographic algorithm

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Another name for unencrypted data.

A

Plaintext (cleartext)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Another name for encrypted data.

A

Ciphertext

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

An example of ancient cryptography based on transposition and involving the shifting of each letter of the plaintext message by a certain number of letters, historically three.

A

Caesar cipher

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

This more recent cipher uses the same mechanism as the Caesar cipher but moves each letter 13 places forward.

A

ROT13 cipher

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Also known as private key cryptography, this uses a single key for both encryption of the plaintext and decryption of the ciphertext.

A

Symmetric key cryptography

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

A type of cipher that takes a predetermined number of bits in the plaintext message (commonly 64 bits) and encrypts that block.

A

Block cipher

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

A type of cipher that encrypts each bit in the plaintext message, 1 bit at a time.

A

Stream cipher

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

A set of symmetric block ciphers endorsed by the US government through NIST. Shares the same block modes that DES uses and also includes other modes such as XEX-based TCB mode.

A

AES

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

AES shares the same block modes that DES uses and also includes other modes such as XEX-based TCB mode. What does TCB stand for?

A

Tweaked CodeBook

20
Q

Also known as public key cryptography, this method uses two keys: a public key and a private key.

A

Asymmetric key cryptography

21
Q

Uses the RSA algorithm, an asymmetric algorithm, to secure web and email traffic.

A

SSL protocol

22
Q

SSL protocol uses the RSA algorithm to secure web and email traffic. What does SSL stand for?

A

Secure Sockets Layer

23
Q

Also referred to as message digests, these functions do not use a key.

A

Hash functions

24
Q

These provide integrity (but not confidentiality) and are used to determine whether the message has changed.

A

Hashes

25
Q

A method of securing a message that involves generating a hash and encrypting it using a private key.

A

Digital signature

26
Q

Created to link a public key to a particular individual; used as a form of electronic identification for that person.

A

Certificate

27
Q

A trusted entity that handles digital certificates.

A

CA

28
Q

A CA is a trusted entity that handles digital certificates. What does CA stand for?

A

Certificate authority

29
Q

Infrastructure that includes the CAs that issue and verify certificates and the RAs that verify the identity of the individuals associated with the certificates.

A

PKI

30
Q

PKI includes the CAs that issue and verify certificates and the RAs that verify the identity of the individuals associated with the certificates. What does PKI stand for?

A

Public key infrastucture

31
Q

PKI includes the CAs that issue and verify certificates and the RAs that verify the identity of the individuals associated with the certificates. What does RA stand for?

A

Registration authorities

32
Q

A public list that holds all the revoked certificates for a certain period of time.

A

CRL

33
Q

A CRL is a public list that holds all the revoked certificates for a certain period of time. What does CRL stand for?

A

Certificate revocation list

34
Q

Data that is on a storage device of some kind and is not moving.

A

Data at rest

35
Q

Data that is moving over a WAN, LAN, wireless network, over the internet, or in other ways.

A

Data in motion

36
Q

This type of data is protected using data security (encryption) and physical security.

A

Data at rest

37
Q

This type of data is best protected by protecting the data itself (using SSL/TLS) and protecting the connection (using IPsec/SSL VPN).

A

Data in motion

38
Q

This type of data is the hardest to protect.

A

Data in use

39
Q

A subset of cryptography that refers specifically to the transformation of unencrypted data into its encrypted form.

A

Encryption

40
Q

The process of recovering the plaintext message from the cipher text.

A

Decryption

41
Q

The science of breaking through encryption.

A

Cryptanalysis

42
Q

Hashes provide ___, but not ___.

A

integrity & confidentiality

43
Q

Shovels and Shingles is a small construction company consisting of 12 computers that have Internet access. The company is concerned that a wily, computer-savvy competitor will send e-mail messages pretending to be from Shovels and Shingles to its customers, in an attempt to gather customer information. What encryption solution best prevents a competitor from successfully impersonating the company?

A

Digital signatures

44
Q

Backordered Parts is a defense contractor that builds communications parts for the military. The employees use mostly Web-based applications for parts design and information sharing. Due to the sensitive nature of the business, Backordered Parts would like to implement a solution that secures all browser connections to the Web servers. What encryption solution best meets this company’s needs?

A

ECC

45
Q

Backordered Parts is a defense contractor that builds communications parts for the military. The employees use mostly Web-based applications for parts design and information sharing. Due to the sensitive nature of the business, Backordered Parts would like to implements a solution that secures all browser connections to the Web servers.

ECC best meets this company’s needs. What does ECC stand for?

A

Elliptic Curve Cryptography

46
Q

We are somewhat limited in out ability to protect which type of data?

A

Data in use