ch 3 Flashcards

1
Q

scrambling information so i cannot be read

A

cryptography

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

hides the existing data in other pieces of data/ image audio or video

A

steganography

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

information within the data

A

meta data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

data stored or transmitted without encryption

A

cleartext data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

procedures based on a mathematical formula used to encrypt and decrypt the data

A

cryptographic algorithm

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

mathematical value entered into the algorithm to produce the cipher text

A

key

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

substitutes one character for another

A

substitution cipher

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

based on the binary operation exclusive or that compares to two bits

A

XOR Cipher

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

software that relies upon an algorithm for creating a sequence of numbers whose properties approximate those of random number.

A

(PRNG) Pseudorandom number generator

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

if a single character of plaintext is changed then it should result in multiple characters of the cipher text change

A

diffusion

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

the key not relate in simple way to the cipher text

A

confusion

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

ensures only authorized parties can view it

A

confidentiality

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

ensures information is correct and unaltered

A

integrity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

ensures sender can be verified through cryptography

A

authentication

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

provides that a user performed an action

A

non-repudiation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

making something obscure or unclear

A

obfuscation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

data actions being performed by “endpoint devices”

A

data in use

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

actions that transmit the data across the network

A

data in transit

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

data is stored on electronic media

A

data at rest

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

the ability to quickly recover the resources vs. security constraints

A

high resiliency

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

takes one character and replaces it with another (RC-4)

A

stream cipher

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

manipulates an entire block of plaintext at one time

A

block cipher

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

takes a input string of any length and returns a string of any requested variable length

A

sponge function

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

creates a unique “digital fingerprint “ of a set of data. (symmetric cryptographic algorithms and asymmetric cryptographic algorithms

A

hashing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
short and long data sets that have the same size hash
fixed size
26
two different data sets cannot produce the same hash
unique
27
data set cannot be created to have a predefined hash
original
28
resulting hash cannot be reversed to determine original plaintext
secure
29
padded to 512 bits/ MD hash algorithms/ weakness in compression function could lead to collusion
Message Digest (MD5)
30
More secure than MD and had a collision in 2012 (no longer secure)
(SHA) Secure Hash Algorithm
31
(European standard) Primary design feature is two different and independent parallel chains of command.
(RIPEMD) race integrity primitives evaluation message digest
32
uses a shared key, possessed by a sender and a receiver. Receiver uses a key to decrypt the hash. (CBC-MAC) cipher block chaining message authentication code
(HMAC) Hashed message authentication code
33
used the same single key to encrypt and decrypt a document. also called private key cryptography
Symmetric Cryptographic Algorithms
34
symmetric algorithm designed in the early 1970's. uses a 52 bit key and is a block cipher
(DES) Data encryption standard
35
designed to replace DES uses three rounds of encryption, cypher text of the first round input for second iteration, most secure versions use different keys used for each round.
(3DES) Triple data encryption standard
36
Symmetric cypher approved by the NIST 2000 as a replacement for DES three steps on every block 128 bits of plaintext.
(AES) Advanced encryption standard
37
what encryption has each version has a number of rounds for each encryption 123=10, 192=12, 256=14
(AES) Advanced encryption standard
38
RC1-6 (RC4 Stream)
Rivest Cipher
39
Block cipher on 64 bit blocks, lengths from 32-448 bits, no significant weakness have been identified
blowfish
40
User in european nations, 64 bits, 128 bit key with 8 rounds. (used in PGP)
(IDEA) International in Encryption Algorithm
41
Also known as a public key cryptography, uses two mathematically related keys, public keys are available to everyone and private keys are known only to the individual who it belongs to.
Asymmetric Cryptographic Algorithm
42
common asymmetric cryptographic algorithms
RSA, Elliptic Curve Cryptography, digital Signature Algorithm, Those related to Key exchange.
43
published in 1997 and patented by MIT in 1983, most common asymmetric cryptographic algorithm/ uses two large primary numbers
(RSA) Rivest, Shamir and Adelman
44
Users share one curve and one point on the curve, less computing power than prime number based asymmetric cryptography, considered as an alternative for prime number based asymmetric cryptography for mobile wireless devices.
(DSA) Digital Signature Algorithm
45
what does (DH) Diffie-Hellman do
transfer same key each time
46
what does (DHE) Diffie- Hellman Ephemeral do
Transfers new key every time
47
what does (ECDH) Elliptic curve Diffie-Hellman do
transfers same key every time
48
what to cryptographic attacks do
attack , target algorithm weaknesses, and exploit collisions
49
what is known as cipher attacks, downgrade attacks, using deprecated algorithms, taking advantage of improperly implemented algorithms.
Algorithm attacks
50
statistical tool used to discover a pattern in cipher texts
known cipher text attack
51
Threat actor forces the system to abandon the current higher security mode of operation and instead of fall back to implementing an older and less secure mode.
downgrade attack
52
means to use a cryptographic algorithm that should not be used because of known vulnerabilities
using deprecated algorithms
53
finding two input strings of a hash function that produce the same hash result.
collision attack
54
50 percent chance that someone will have the same birthday out of 20 people
birthday attack
55
encryption software that can be used to encrypt or decrypt files one by one
file and file system cryptography
56
Asymmetric system Used for files and emails on windows computers
(PGP) Pretty good Privacy
57
Asymmetric system that runs on windows UNIX, Linux, operating systems.
(GNUPG) GNU Privacy Guard
58
file encryption system that runs on Microsoft Windows
(EFS) Encryption File System
59
Protects data on hard drives (EX. Bitlocker)
(FDE) Full disk encryption
60
type of encryption where everything is encrypted once added to the drive, admin can remotely control activity on the device, and can be remotely disabled.
USB Device Encryption
61
type of encryption where it protects all files stored on them, authenticating during initial startup, if authentication fails, the device can be configured to deny access or even delete the files.
(SED's) Self-encrypted Drives
62
Chip on the motherboard that provides cryptographic services, includes true random number generator.
(TPM) Trusted platform module
63
secure cryptographic processor, performs accelerated symmetric and asymmetric encryption
(HSM) Hardware security Module