Basics Of Crypto Flashcards

1
Q

What are the drawbacks of using a symmetric key cipher?

A

Requires a secure method of key transfer

Must be stored securely

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is a random number generator?

A

A secure pseudorandom number generator used for algorithms

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Explain DES?

A
  • block cipher with 64-bit blocks
  • no longer considered secure
  • short key length
  • brute force attacks easy
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Explain 3DES?

A
  • replacement for DES

- applies DES 3 times to each block

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Explain IDEA?

A

International data encryption algorithm

  • 128-bit block cipher
  • intended as replacement for DES
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Explain AES?

A
  • designed as replacement for DES
  • a different number of rounds for each key length
  • key schedule allows weakness
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Explain RC4?

A
  • generates pseudo-random keystream

- keystream XORed with plaintext to create cipher

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Explain asymmetric key encryption?

A
  • uses two mathematically related keys
  • one to encrypt, one to decrypt
  • public key can be freely sent over insecure network
  • private key must be private
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Weakness of asymmetric cipher?

A
  • Easy one way, difficult the other

- Security if private key must be maintained

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Explain man in the middle attacks?

A
  • pure victim to fill in authentication over a supposedly secure link
  • att lets intercepts
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Explain RSA?

A
  • generates asymmetric key pairs
  • often used to secure transfer of symmetric keys
  • superseded by elliptic curve
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is modular arithmetic?

A
  • underlies many public-key algorithms

- Uses extremely large modulus

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Explain RSA key generation?

A
  • two prime numbers

- n = p x q

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Weaknesses of RSA algorithm?

A
  • security rests on two mathematical problems

- quantum computers can break RSA

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Explain diffie-hellman?

A

Two parties establish a shared secret key

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Problems with diffie-Hellman key agreement?

A
  • original protocol contained no method of authentication
17
Q

Explain elliptic curve cryptography?

A

= y2 = x3 + ax + b

18
Q

What is PGP?

A
  • pretty good privacy
  • creates public/private key pair
  • public key built into certificate