7 Cryptography and the PKI Flashcards

1
Q
A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What are the four goals of cryptography?

A

Confidentiality, integrity, authentication, non-repudiation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What does confidentiality in cryptography refer to?

A

The use of encryption to protect sensitive information from prying eyes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Define integrity in the context of cryptography.

A

Ensuring that data is not maliciously or unintentionally altered

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is authentication in cryptography?

A

Validating the identity of individuals using encryption

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Explain non-repudiation in cryptography.

A

Ensures that individuals can prove to a third party that a message came from its purported sender

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is symmetric encryption?

A

Uses the same shared secret key to encrypt and decrypt information

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is required for symmetric encryption to function?

A

A mechanism to exchange shared secret keys

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What does the Diffie–Hellman algorithm provide?

A

An approach to exchange shared secret keys for symmetric encryption

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is asymmetric encryption?

A

Provides each user with a pair of keys: a public key and a private key

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

How does asymmetric encryption work?

A

Anything encrypted with one key can be decrypted with the other key from the pair

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

How do digital signatures provide non-repudiation?

A

By allowing a third party to verify the authenticity of a message

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What process is followed to create a digital signature?

A

Using a hash function to generate a message digest and encrypting it with the sender’s private key

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

How can others verify a digital signature?

A

Decrypting it with the sender’s public key and comparing the message digest

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is the purpose of digital certificates?

A

To provide a trusted mechanism for sharing public keys

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Who issues digital certificates?

A

Certificate authorities (CAs)

17
Q

What role do CAs play in digital certificates?

A

They apply their digital signature to demonstrate trust in the certificate

18
Q

What can recipients of a digital certificate rely on?

A

The public key it contains if they trust the issuing CA

19
Q

What is Tor’s significance in cryptography?

A

Uses perfect forward secrecy for anonymous communication over the Internet

20
Q

What is the blockchain?

A

An immutable distributed public ledger made possible through the use of cryptography