B11 - Cryptography Flashcards

1
Q

What is encoding?

A

PRESERVATION - The process of transforming data into such a format that it can be by a different type of system using publicly available algorithms.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is encryption?

A

OBFUSCATION - The process to encode data securely such that only the authorized user who knows the key or password is able to retrieve the original data for everyone else it is just rubbish.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Examples of common encrypted algorithms:

A

AES, RSA, DES, RC4 Blowfish, Triple DES, Twofish

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Examples of common encoding algorithms:

A

Base64, ASCII, UNICODE, URL encoding

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is the difference between encryption and encoding?

A

Encryption requires a secret key and not reversible without it, whereas encoding mean it uses a predefine scheme to convert data from one form to another with no key e.g. base64.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What does DES stand for?

A

Data Encryption Standard

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is DES?

A

Symmetric algorithm that uses a key and the same key to decrypt the message.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is the key and bit size of DES?

A

KEY: 56 bits, BLOCK: 64 bits.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What does 3DES, TDEA or TRIPLE DEA stand for?

A

Triple Data Encryption Algorithm

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is3DES, TDEA or TRIPLE DEA?

A

Symmetric block cipher that applies DES cipher algorithm three time to each data block

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is the key and block size of 3DES, TDEA or TRIPLE DEA?

A

KEY:168, 122 or 56 bits, BLOCK: 64 bits.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What does AES stand for?

A

Advanced Encryption Standard

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is AES?

A

Symmetric block cipher that secures data by converting it into unreadable format without the proper key.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is the key and block size of AES?

A

KEY: 128, 192 and 256 bits, BLOCK: 128

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What does RSA stand for?

A

Asymmetric algorithm that used two keys: a public key for encryption and a private key for decryption.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is the key size of RSA?

A

2048 and 4096 bits

17
Q

What does RC4 stand for?

A

Rivert Cipher 4

18
Q

What does RC4 do?

A

Symmetric stream cipher which encrypts one byte at a time. - Popular used in SSL and WEP but no longer considered secure.

19
Q

What is the key size of RC4?

A

Variable - typically between 40 and 2048 bits. Larger key = better security.

20
Q

What algorithms are block ciphers?

A

AES, Blowfish, DES, Twofish, 3DES, Serpant

21
Q

What algorithms are stream ciphers?

A

ChaCha, RC4, A5, Salsa20, Chameleon

22
Q

What does SHA1 stand for?

A

Secure Hash Algorithm

23
Q

How does SHA1 work?

A

Takes input and produces hash value known as message digest that is a fixed-size singular and irreversible.

24
Q

What is the hash length of SHA1?

A

160 bit hash length (20 bytes)

25
Q

What does MD5 stand for?

A

Message Digest Algorthim

26
Q

How does MD5 work?

A

Like SHA-1, MD5 processes input data in 512-bit blocks but produces a smaller hash size - Lack security but still used as checksum for data integrity.

27
Q

What is the hash length of MD5?

A

128 bit (16 byte)

28
Q

What hash begins with $1$?

A

MD5

29
Q

What hash begins with $2$?

A

Blowfish

30
Q

What hash begins with $2a$?

A

Eskblowfish

31
Q

What hash begins with $5$?

A

SHA-256

32
Q

What hash begins with $6$?

A

SHA-512

33
Q

What hash begins with $8$?

A

PBKDF2-SHA256

34
Q

What hash begins with $9$?

A

scrypt

35
Q

What does HMAC stand for?

A

Hash-based Message Authentication Code

36
Q

What is HMAC?

A

Can achieve authentication and verify that data is correct and authentic with shared secret, as opposed to approaches that use signatures and asymmetric cryptography