5 Summarizing Basic Cryptographic Concepts Flashcards

1
Q

What is a Cipher?

A

particular operations performed to encode or decode data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is Cryptography?

A

the art of making information secure by encoding it

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is plaint text?

A

an unencrypted message

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is a Ciphertext?

A

An encrypted message

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is a Cryptoanalysis?

A

the art of cracking cryptographic systems

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is an Alice?

A

the sender of a genuine message

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is Bob?

A

the intended recipient of the message

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is a Mallory?

A

a malicious attacker attempting to subvert the message in some way

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is Hashing?

A

cryptographic hashing algorithm produces a fixed-length string from an input plaintext that can be of any length

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is a checksum?

A

The output of a hashing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is Secure Hash Algorithm (SHA)?

A

considered the strongest algorithm. There are variants that produce different-sized outputs, with longer digests considered more secure. The most popular variant is SHA-256, which produces a 256-bit digest

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is Message Digest Algorithm #5 (MD5)?

A

produces a 128-bit digest. MD5 is not considered to be quite as safe for use as SHA-256, but it might be required for compatibility between security products

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is a symmetric encryption?

A

one in which encryption and decryption are both performed by the same secret key. The secret key is so-called because it must be kept secret

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is symmetric encryption?

A

Used for confidentiality

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is a Stream Cipher?

A

each byte or bit of data in the plaintext is encrypted one at a time. This is suitable for encrypting communications where the total length of the message is not known. The plaintext is combined with a separate randomly generated message, calculated from the key and an initialization vector (IV)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is an Initialization Vector?

A

ensures the key produces a unique ciphertext from the same plaintext

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

What is a block cipher?

A

plaintext is divided into equal-size blocks (usually 128-bit). If there is not enough data in the plaintext, it is padded to the correct size using some string defined in the algorithm

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

What is Advanced Encryption Standard (AES)?

A

the default symmetric encryption cipher for most products. Basic AES has a key size of 128 bits, but the most widely used variant is AES256, with a 256-bit key

19
Q

What is a Keyspace?

A

The range of key values available to use with a particular cipher

20
Q

What does a public key do?

A

Encrypts a message

21
Q

What does a private key do?

A

Decrypts a message

22
Q

What is Asymmetric encryption?

A

Public-key cryptography, or asymmetric cryptography, is a cryptographic system that uses pairs of keys.

23
Q

What is a trapdoor function?

A

a function that is easy to compute in one direction, yet difficult to compute in the opposite direction without special information

24
Q

What is a Elliptic curve cryptography (ECC)?

A

allows smaller keys compared to non-EC cryptography to provide equivalent security

25
Q

What is a digital signature?

A

a hash that is then encrypted using a private key

26
Q

What is the Digital Signature Algorithm (DSA)?

A

uses elliptic curve cryptography (ECC) rather than the RSA ciphe

27
Q

What is a digital envelope?

A

allows the sender and recipient to exchange a symmetric encryption key securely by using public key cryptography

28
Q

What is Public key infrastructure (PKI)

A

The process of issuing and verifying certificates

29
Q

What is the Certificate of Authority (CA)?

A

a third party who validates the owner of the public key by issuing the subject with a certificate. The certificate is signed by the CA. If the recipient also trusts the CA, they can also trust the public key wrapped in the subject’s certificate

30
Q

What is a cipher suite?

A

The combination of ciphers

31
Q

What is a signature algorithm?

A

used to assert the identity of the server’s public key and facilitate authentication

32
Q

What is a key exchange/agreement algorithm?

A

used by the client and server to derive the same bulk encryption symmetric key

33
Q

What is Cipher Block Chaining (CBC) Mode?

A

applies an initialization vector (IV) to the first plaintext block to ensure that the key produces a unique ciphertext from any given plaintext

34
Q

What is Counter mode (CTM)?

A

makes the AES algorithm work as a stream cipher. Counter mode applies an IV plus an incrementing counter value to the key to generate a keystream. The keystream is then XOR’ed to the data in the plaintext blocks. Each block can be processed individually and consequently in parallel, improving performance. Also, counter modes do not need to use padding. Any unused space in the last block is simply discarded

35
Q

What is a message authentication code (MAC)?

A

provides an authentication and integrity mechanism by hashing a combination of the message output and a shared secret key

36
Q

what is Authenticated Encryption with Additional Data (AEAD)?

A

the associated data allows the receiver to use the message header to ensure the payload has not been replayed from a different communication stream

37
Q

What is Password spraying?

A

a horizontal brute-force online attack. This means that the attacker chooses one or more common passwords and tries to use them in conjunction with multiple usernames

38
Q

What is a pre shared key (PSK)?

A

passphrase to generate the key used to encrypt communications. Group authentication is another term for PSK since a group of users shares the same secret

39
Q

What are rainbow tables?

A

attacks where an attacker uses a set of related plaintext passwords and their hashes to crack passwords.

40
Q

What is perfect forward secrecy (PFS)?

A

A characteristic of transport encryption that ensures if a key is compromised , the compromise will only affect a single session and not facilitate recovery of plaintext data from other sessions

41
Q

What is a Diffie-Hellman (DH)

A

A cryptographic technique that provides secure key exchange

42
Q

What is a Electronic Code Book (ECB)?

A

is a mode operation that will process the encryption in blocks using the same key. This is the simplest and fastest mode.

43
Q

What is Perfect forward secrecy?

A

ensures that a compromise of long-term encryption keys will not compromise data encrypted by these keys in the past

44
Q

What is a ephemeral key?

A

An ephemeral key is the main component of ECDHE that makes it a perfect forward secrecy. There is a different secret key for each session during transport.