6.1 Basic concepts of cryptography Flashcards

1
Q

Symmetric encryption

A

A two-way encryption scheme in which encryption and decryption are both performed by the same key. Also known as shared-key encryption.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Modes of operation

A

The way a cryptographic product processes multiple blocks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Asymmetric algorithms

A

A

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Hashing

A

Hashing is the transformation of a string of characters into a usually shorter fixed-length value or key that represents the original string.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Salt

A

A random or pseudo-random number or string.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Elliptic curve cryptography

A

An asymmetric encryption technique that leverages the algebraic structures of elliptic curves over finite fields.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Key exchange

A

Any method by which cryptographic keys are transferred among users, thus enabling the use of a cryptographic algorithm.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Digital signatures

A

A message digest that has been encrypted again with a user’s private key.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Diffusion

A

Means that predictable features of the plaintext should not be evident in the ciphertext

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Confusion

A

Means that predictable features of the plaintext should not be evident in the ciphertext

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Collision

A

When a function produces the same hash value for two different inputs

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Steganography

A

Hiding a message within another message or data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Obfuscation

A

The art of making a message difficult to understand

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Stream vs. block

A

In a stream cipher, each byte or bit of data in the plaintext is encrypted one at a time.

In a block cipher, the plaintext is divided into equal-size blocks (usually 64- or 128-bit). Each block is then subjected to complex transposition and substitution operations, based on the value of the key used.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Key strength

A

A

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Session keys

A

A one-time encryption key used to symmetrically encrypt one communication session only

17
Q

Ephemeral key

A

Using a different secret key for each session.

18
Q

Data in transit

A

The state when data is transmitted over a network. Examples of types of data that may be in transit include website traffic, remote access traffic. In this state, data can be protected by a transport encryption protocol, such as TLS or IPSec.

19
Q

Data at rest

A

This state means that the data is in some sort of persistent storage media. Examples of types of data that may be at rest include financial information stored in databases, archived audiovisual media, operational policies and other management documents, system configuration data, and more.

20
Q

Data in use

A

This is the state when data is present in volatile memory, such as system RAM or CPU registers and cache. Examples of types of data that may be in use include documents open in a word processing application, database data that is currently being modified, event logs being generated while an operating system is running.

21
Q

Random/pseudorandom number generation

A

Uses software routines to simulate randomness. The generator usually uses data from the system, such as mouse and keyboard input timing, process IDs, and hard drive samples, as a seed. The seed state is then passed through a mathematical formula in order to output a pseudorandom number.

22
Q

Key stretching

A

A technique to make the key generated from a user password stronger is by—basically—playing around with it lots of times.

23
Q

Implementation vs. algorithm selection

A

It is important to realize that just because an algorithm, such as AES, is considered strong does not mean that the implementation of that cipher in a programming library is also strong. The implementation may have weaknesses.

24
Q

Crypto service provider

A

(CSP) A cryptographic module that implements Microsoft’s CryptoAPI.

25
Q

Crypto modules

A

Algorithms underpinning cryptography that are interpreted and packaged as a computer program or programming library.

26
Q

Perfect forward secrecy

A

A characteristic of session encryption that ensures if a key used during a certain session is compromised, it should not affect data previously encrypted by that key.

27
Q

Security through obscurity

A

Means keeping something a secret by hiding it.

28
Q

Low power devices

A

Some technologies require more processing cycles and memory space. This makes them slower and means they consume more power. Consequently, some algorithms and key strengths are unsuitable for handheld devices and embedded systems, especially those that work on battery power. Another example is a contactless smart card, where the card only receives power from the reader and has fairly limited storage capacity, which might affect the maximum key size supported.

29
Q

Low latency

A

If cryptography is deployed with a real time-sensitive channel, such as voice or video, the processing overhead on both the transmitter and receiver must be low enough not to impact the quality of the signal.

30
Q

Supporting integrity

A

Encryption guarantees the message is tamper-proof

31
Q

Supporting obfuscation

A

Cryptography is effectively used with messages.
Cryptography cannot be used with source code because it obfuscates the code too much to the point where the computer can’t compile the code.

32
Q

Supporting authentication

A

If you are able to encrypt a message in a particular way, it follows that the recipient of the message knows with whom he or she is communicating (that is, the sender is authenticated).

33
Q

Supporting non-repudiation

A

Non-repudiation is the concept that the sender cannot deny sending the message. If the message has been encrypted in a way known only to the sender, it follows that the sender must have composed it.

34
Q

Resource vs. security constraints

A

The comparative strength of one cipher over another largely depends on the bit-strength of the key and the quality of the algorithm. Some algorithms have known weaknesses and are deprecated for use in particular contexts

35
Q

Nonce

A

the principal characteristic of a nonce is that it is never reused (“number used once”) within the same scope (that is, with the same key value). It could be a random or pseudo-random value, or it could be a counter value.

36
Q

IV

A

(Initialization Vector) The principal characteristic of an IV is that it be random (or pseudo-random).

37
Q

Supporting confidentiality

A

A cryptographic (or encrypted) message can only be understood by someone with the right decrypting cipher