ch 3 Flashcards

1
Q

scrambling information so i cannot be read

A

cryptography

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

hides the existing data in other pieces of data/ image audio or video

A

steganography

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

information within the data

A

meta data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

data stored or transmitted without encryption

A

cleartext data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

procedures based on a mathematical formula used to encrypt and decrypt the data

A

cryptographic algorithm

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

mathematical value entered into the algorithm to produce the cipher text

A

key

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

substitutes one character for another

A

substitution cipher

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

based on the binary operation exclusive or that compares to two bits

A

XOR Cipher

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

software that relies upon an algorithm for creating a sequence of numbers whose properties approximate those of random number.

A

(PRNG) Pseudorandom number generator

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

if a single character of plaintext is changed then it should result in multiple characters of the cipher text change

A

diffusion

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

the key not relate in simple way to the cipher text

A

confusion

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

ensures only authorized parties can view it

A

confidentiality

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

ensures information is correct and unaltered

A

integrity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

ensures sender can be verified through cryptography

A

authentication

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

provides that a user performed an action

A

non-repudiation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

making something obscure or unclear

A

obfuscation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

data actions being performed by “endpoint devices”

A

data in use

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

actions that transmit the data across the network

A

data in transit

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

data is stored on electronic media

A

data at rest

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

the ability to quickly recover the resources vs. security constraints

A

high resiliency

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

takes one character and replaces it with another (RC-4)

A

stream cipher

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

manipulates an entire block of plaintext at one time

A

block cipher

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

takes a input string of any length and returns a string of any requested variable length

A

sponge function

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

creates a unique “digital fingerprint “ of a set of data. (symmetric cryptographic algorithms and asymmetric cryptographic algorithms

A

hashing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

short and long data sets that have the same size hash

A

fixed size

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

two different data sets cannot produce the same hash

A

unique

27
Q

data set cannot be created to have a predefined hash

A

original

28
Q

resulting hash cannot be reversed to determine original plaintext

A

secure

29
Q

padded to 512 bits/ MD hash algorithms/ weakness in compression function could lead to collusion

A

Message Digest (MD5)

30
Q

More secure than MD and had a collision in 2012 (no longer secure)

A

(SHA) Secure Hash Algorithm

31
Q

(European standard) Primary design feature is two different and independent parallel chains of command.

A

(RIPEMD) race integrity primitives evaluation message digest

32
Q

uses a shared key, possessed by a sender and a receiver. Receiver uses a key to decrypt the hash. (CBC-MAC) cipher block chaining message authentication code

A

(HMAC) Hashed message authentication code

33
Q

used the same single key to encrypt and decrypt a document. also called private key cryptography

A

Symmetric Cryptographic Algorithms

34
Q

symmetric algorithm designed in the early 1970’s. uses a 52 bit key and is a block cipher

A

(DES) Data encryption standard

35
Q

designed to replace DES uses three rounds of encryption, cypher text of the first round input for second iteration, most secure versions use different keys used for each round.

A

(3DES) Triple data encryption standard

36
Q

Symmetric cypher approved by the NIST 2000 as a replacement for DES three steps on every block 128 bits of plaintext.

A

(AES) Advanced encryption standard

37
Q

what encryption has each version has a number of rounds for each encryption 123=10, 192=12, 256=14

A

(AES) Advanced encryption standard

38
Q

RC1-6 (RC4 Stream)

A

Rivest Cipher

39
Q

Block cipher on 64 bit blocks, lengths from 32-448 bits, no significant weakness have been identified

A

blowfish

40
Q

User in european nations, 64 bits, 128 bit key with 8 rounds. (used in PGP)

A

(IDEA) International in Encryption Algorithm

41
Q

Also known as a public key cryptography, uses two mathematically related keys, public keys are available to everyone and private keys are known only to the individual who it belongs to.

A

Asymmetric Cryptographic Algorithm

42
Q

common asymmetric cryptographic algorithms

A

RSA, Elliptic Curve Cryptography, digital Signature Algorithm, Those related to Key exchange.

43
Q

published in 1997 and patented by MIT in 1983, most common asymmetric cryptographic algorithm/ uses two large primary numbers

A

(RSA) Rivest, Shamir and Adelman

44
Q

Users share one curve and one point on the curve, less computing power than prime number based asymmetric cryptography, considered as an alternative for prime number based asymmetric cryptography for mobile wireless devices.

A

(DSA) Digital Signature Algorithm

45
Q

what does (DH) Diffie-Hellman do

A

transfer same key each time

46
Q

what does (DHE) Diffie- Hellman Ephemeral do

A

Transfers new key every time

47
Q

what does (ECDH) Elliptic curve Diffie-Hellman do

A

transfers same key every time

48
Q

what to cryptographic attacks do

A

attack , target algorithm weaknesses, and exploit collisions

49
Q

what is known as cipher attacks, downgrade attacks, using deprecated algorithms, taking advantage of improperly implemented algorithms.

A

Algorithm attacks

50
Q

statistical tool used to discover a pattern in cipher texts

A

known cipher text attack

51
Q

Threat actor forces the system to abandon the current higher security mode of operation and instead of fall back to implementing an older and less secure mode.

A

downgrade attack

52
Q

means to use a cryptographic algorithm that should not be used because of known vulnerabilities

A

using deprecated algorithms

53
Q

finding two input strings of a hash function that produce the same hash result.

A

collision attack

54
Q

50 percent chance that someone will have the same birthday out of 20 people

A

birthday attack

55
Q

encryption software that can be used to encrypt or decrypt files one by one

A

file and file system cryptography

56
Q

Asymmetric system Used for files and emails on windows computers

A

(PGP) Pretty good Privacy

57
Q

Asymmetric system that runs on windows UNIX, Linux, operating systems.

A

(GNUPG) GNU Privacy Guard

58
Q

file encryption system that runs on Microsoft Windows

A

(EFS) Encryption File System

59
Q

Protects data on hard drives (EX. Bitlocker)

A

(FDE) Full disk encryption

60
Q

type of encryption where everything is encrypted once added to the drive, admin can remotely control activity on the device, and can be remotely disabled.

A

USB Device Encryption

61
Q

type of encryption where it protects all files stored on them, authenticating during initial startup, if authentication fails, the device can be configured to deny access or even delete the files.

A

(SED’s) Self-encrypted Drives

62
Q

Chip on the motherboard that provides cryptographic services, includes true random number generator.

A

(TPM) Trusted platform module

63
Q

secure cryptographic processor, performs accelerated symmetric and asymmetric encryption

A

(HSM) Hardware security Module