5) Cryptography Flashcards

1
Q

The act of scrambling plain text into cyphertext.

A

Encryption

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

(T/F) A strong hash function is designed so that a message cannot be forged that will result in the same hash as a legitimate message.

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

An encryption cipher that uses the same key to encrypt and decrypt.

A

Symmetric key

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

(T/F) Hashes provide confidentiality and integrity.

A

False

Hashes only provide integrity.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

An algorithm used for cryptographic purposes.

A

Cipher

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

___ corroborates the identity of an entity, whether it is the sender, the sender’s computer, some device, or some information.

A

Authentication

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

The science of keeping information secure.

A

Cryptography

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

The science of breaking through the encryption used to create the cyphertext.

A

Cryptanalysis

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

The overarching field of study that covers cryptography and cryptanalysis.

A

Cryptology

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

The specifics of the process used to encrypt the plaintext or decrypt the ciphertext.

A

Cryptographic algorithm

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Another name for unencrypted data.

A

Plaintext (cleartext)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Another name for encrypted data.

A

Ciphertext

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

An example of ancient cryptography based on transposition and involving the shifting of each letter of the plaintext message by a certain number of letters, historically three.

A

Caesar cipher

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

This more recent cipher uses the same mechanism as the Caesar cipher but moves each letter 13 places forward.

A

ROT13 cipher

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Also known as private key cryptography, this uses a single key for both encryption of the plaintext and decryption of the ciphertext.

A

Symmetric key cryptography

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

A type of cipher that takes a predetermined number of bits in the plaintext message (commonly 64 bits) and encrypts that block.

A

Block cipher

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

A type of cipher that encrypts each bit in the plaintext message, 1 bit at a time.

A

Stream cipher

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

A set of symmetric block ciphers endorsed by the US government through NIST. Shares the same block modes that DES uses and also includes other modes such as XEX-based TCB mode.

A

AES

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

AES shares the same block modes that DES uses and also includes other modes such as XEX-based TCB mode. What does TCB stand for?

A

Tweaked CodeBook

20
Q

Also known as public key cryptography, this method uses two keys: a public key and a private key.

A

Asymmetric key cryptography

21
Q

Uses the RSA algorithm, an asymmetric algorithm, to secure web and email traffic.

A

SSL protocol

22
Q

SSL protocol uses the RSA algorithm to secure web and email traffic. What does SSL stand for?

A

Secure Sockets Layer

23
Q

Also referred to as message digests, these functions do not use a key.

A

Hash functions

24
Q

These provide integrity (but not confidentiality) and are used to determine whether the message has changed.

25
A method of securing a message that involves generating a hash and encrypting it using a private key.
Digital signature
26
Created to link a public key to a particular individual; used as a form of electronic identification for that person.
Certificate
27
A trusted entity that handles digital certificates.
CA
28
A CA is a trusted entity that handles digital certificates. What does CA stand for?
Certificate authority
29
Infrastructure that includes the CAs that issue and verify certificates and the RAs that verify the identity of the individuals associated with the certificates.
PKI
30
PKI includes the CAs that issue and verify certificates and the RAs that verify the identity of the individuals associated with the certificates. What does PKI stand for?
Public key infrastucture
31
PKI includes the CAs that issue and verify certificates and the RAs that verify the identity of the individuals associated with the certificates. What does RA stand for?
Registration authorities
32
A public list that holds all the revoked certificates for a certain period of time.
CRL
33
A CRL is a public list that holds all the revoked certificates for a certain period of time. What does CRL stand for?
Certificate revocation list
34
Data that is on a storage device of some kind and is not moving.
Data at rest
35
Data that is moving over a WAN, LAN, wireless network, over the internet, or in other ways.
Data in motion
36
This type of data is protected using data security (encryption) and physical security.
Data at rest
37
This type of data is best protected by protecting the data itself (using SSL/TLS) and protecting the connection (using IPsec/SSL VPN).
Data in motion
38
This type of data is the hardest to protect.
Data in use
39
A subset of cryptography that refers specifically to the transformation of unencrypted data into its encrypted form.
Encryption
40
The process of recovering the plaintext message from the cipher text.
Decryption
41
The science of breaking through encryption.
Cryptanalysis
42
Hashes provide ___, but not ___.
integrity & confidentiality
43
Shovels and Shingles is a small construction company consisting of 12 computers that have Internet access. The company is concerned that a wily, computer-savvy competitor will send e-mail messages pretending to be from Shovels and Shingles to its customers, in an attempt to gather customer information. What encryption solution best prevents a competitor from successfully impersonating the company?
Digital signatures
44
Backordered Parts is a defense contractor that builds communications parts for the military. The employees use mostly Web-based applications for parts design and information sharing. Due to the sensitive nature of the business, Backordered Parts would like to implement a solution that secures all browser connections to the Web servers. What encryption solution best meets this company's needs?
ECC
45
Backordered Parts is a defense contractor that builds communications parts for the military. The employees use mostly Web-based applications for parts design and information sharing. Due to the sensitive nature of the business, Backordered Parts would like to implements a solution that secures all browser connections to the Web servers. ECC best meets this company's needs. What does ECC stand for?
Elliptic Curve Cryptography
46
We are somewhat limited in out ability to protect which type of data?
Data in use