CH 2 Flashcards

1
Q

….. is the cornerstone of computer

and communications security.

A

Modern cryptography.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Its foundation is based on various concepts of mathematics such as:

A
  • number theory,
  • computational-complexity theory,
  • probability theory.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

How does Classic cryptography manipulate ?

A

Classic Cryptography manipulates traditional characters.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

How does Modern cryptography manipulate ?

A

Modern Cryptography operates on binary bit sequences.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is Classic cryptography based on ?

A

Classic Cryptography is mainly based on ‘security through obscurity’. the techniques employed for coding were kept secret and only the parties involved in communication knew about them.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is Modern cryptography based on ?

A
  • Modern Cryptography relies on publicly known mathematical algorithms for coding the information. Secrecy is obtained through a secret key which is used as the seed for the algorithms. The computational difficulty of algorithms and absence of secret key makes it impossible for an attacker to obtain the original information even if he knows the algorithm used for coding.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What does Classic cryptography require ?

A

It requires the entire cryptosystem for communicating confidentially.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What does Modern cryptography require ?

A

it requires parties interested in secure communication to possess the secret key only.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Cryptology consists of 2 important thing ….. and ….. .

A

Cryptography, Cryptoanalysis.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is cryptography ?

A

it is the art and science of making a cryptosystem that is capable of providing information security. Cryptography deals with the actual securing of digital data. It refers to the design of mechanisms based on mathematical algorithms that provide fundamental information security services.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

We can look at cryptography as a large toolkit containing ….. .

A

Different techniques in security applications.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is Cryptanalysis?

A

It is the art and science of breaking the cipher text. It involves the study of cryptographic mechanism with the intention to break them.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Cryptanalysis is also used during the design of the new cryptographic techniques to ….. .

A

Test their security strengths.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

….. is concerned with the design of cryptosystems while ….. studies the breaking of the cryptosystems.

A

Cryptography, Cryptoanalysis.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What are the 4 primary objects of Cryptography ?

A
  • Confidentiality
  • Data Integrity
  • Authentication
  • Non-repudiation
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Define Confidentiality.

A

Confidentiality is the fundamental security service provided by cryptography. It is a security service that keeps the information from an unauthorized person. It is sometimes referred to as privacy or secrecy.

17
Q

How can confidentiality be achieved ?

A

Confidentiality can be achieved through numerous means starting from physical securing to the use of mathematical algorithms for data encryption.

18
Q

Define Data integrity.

A

It is security service that deals with identifying any alteration to the data. The data may get modified by an unauthorized entity intentionally or accidently. Integrity service confirms that whether data is intact or not since it was last created, transmitted, or stored by an authorized user.

19
Q

Can data integrity prevent the alteration of data ?

A

NO, But it provides the means for detecting whether data has been manipulated in an unauthorized manner.

20
Q

Define Authentication.

A

It provides the identification of the originator. It confirms to the receiver that the data received has been sent only by an identified and verified sender.

21
Q

What are the 2 variants of authentication service ?

A
  • Message authentication identifies the originator of the message without any regard router or system that has sent the message.
  • Entity authentication is assurance that data has been received from a specific entity, say a
    particular website.
22
Q

Define Non-repudiation.

A

It is a security service that ensures that an entity cannot refuse the ownership of a previous commitment or an action. It is an assurance that the original creator of the data cannot deny the creation or transmission of the said data to a recipient or third
party.

23
Q

….. is a property that is most desirable in situations

where there are chances of a dispute over the exchange of data.

A

Non-repudiation.

24
Q

Define cryptography primitives.

A

Cryptography primitives are the tools and techniques in Cryptography that can be selectively used to provide a set of desired security services.

25
Q

What are the 4 cryptography primitives ?

A
  • Encryption
  • Hash functions
  • Message Authentication codes (MAC)
  • Digital Signatures