5.7 Data Encryption & Encryption Technique Flashcards

1
Q

What is encryption?

A

Process of converting plaintext message into secure coded form text called cipher text. It is done via mathematical function and a special encryption/decryption password called the key

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is encryption used for ?

A

Protect data in transit over networks
Protect information stored on computer
Verify authenticity
Deter & detect accidental/intentional alterations of data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What kind of attack is often use to decrypt cipher text ?

A

Brute forcing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is symmetric key systems ?

A

Use of a unique key for encryption and decryption

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is asymmetric key systems ?

A

Decryption key is different than the one use for encryption. The encryption key is publicly disclosed while the decryption key is kept private

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is the difference between a hash and encryption?

A

Hash is irreversible

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is a digital signature ?

A

A digital code (generated and authenticated by a public key encryption) which is attached to an electronically transmitted document to verify its content, the senders identity and the non repudiation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Give some cryptographic system that are being used

A

DES
AES
RC4 (often used in SSL/TLS protocol sessions)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

A asymmetric key can be used to sign document ?

A

No cos the mechanism is based on a shared secret key between the 2 parties

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What are the 2 advantage of symmetric encryption?

A

Shorter so I can be easily remembered
Less complicated so use less processing time (faster)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What digital signature ensure ?

A

Data integrity
Authentication
Non répudiation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is TLS ?

A

a cryptographic protocol providing secure communication on internet. It allows client-server applications to communicate to prevent eavesdropping, tampering and message forgery attacks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Give public key (assymetric) cryptography:

A

RSA
DSA
Fortezza
Diffie hellman

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Give symmetric cipher cryptography:

A

Rc4
Idea
AES
Des

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Give hash functions names

A

Md5
Sha 512
Sha 256

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Where cryptography is being used?

A

It is used on protocols, for IPSec and to secure mail with S/MIME

17
Q

What is IPSec ?

A

It is used to secure communication at IP level among 2+ host, subnets etc. It is establishes VPN