Ch 3 Key Terms Flashcards

1
Q

the practice of transforming information so that it is cleared and cannot be accessed by unauthorized parties

cryptography
steganography
algorithm
encryption

A

cryptography

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

hides the existence of the data; the appearance of a harmless image can contain hidden data

algorithm
encryption
steganography
cryptography

A

steganography

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

the process of changing the original text into a scrambled message

steganography
algorithm
encryption
cryptography

A

encryption

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

compares two bits; if bits are different, a 1 is returned, but if they are the identical, 0 is returned

XOR cipher
random numbers
diffusion
confusion

A

XOR cipher

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

numbers for which there is no identifiable pattern or sequence; no possible to predict a future number based on a previous number

random numbers
substitution cipher
security through obscurity
diffusion

A

random numbers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

an algorithm for creating a sequence of numbers whose properties approximate those of a random number; attempts to create numbers that are as random as possible

obfuscation
pseudorandom number generator (PRNG)
security through obscurity
non-repudiation

A

pseudorandom number generator (PRNG)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

thwart statistical analysis to make a strong algorithm; if a single character of plaintext is changed then it should result in multiple characters of the ciphertext changing

diffusion
confusion
security through obscurity
obfuscation

A

diffusion

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

the key does not relate in a simple way to the ciphertext; each character of the ciphertext should depend upon several different parts of the key; forces the hacker to create the entire key simultaneously, a difficult task, rather than trying to recreate the key piece by piece.

diffusion
data-in-transit
security through obscurity
confusion

A

confusion

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

the process of proving that a user performed an action such as sending an email message

obfuscation
security through obscurity
high resiliency
non-repudiation

A

non-repudiation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

making something obscure or unclear; cryptography can help ensure obfuscation by hiding the details so that the original code cannot be determined

obfuscation
hash
data-at-rest
security through obscurity

A

obfuscation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

virtually any system can be made secure so long as outsiders are unaware of it or how it functions

high resiliency
security through obscurity
obfuscation
non-repudiation

A

security through obscurity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

data that is stored on electronic media

data-in-transit
data-at-rest
data-in-use
checksum

A

data-at-rest

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

small amount of time that occurs between when something is input into a cryptographic algorithm and the time the output is obtained

checksum
high resiliency
low latency
low-power devices

A

low latency

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

takes one character and replaces it with one character

hash
hash algorithms
stream cipher
block cipher

A

stream cipher

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

manipulates an entire block of plaintext at one time

block cipher
checksum
stream cipher
hash

A

block cipher

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

hash algorithms

MD5, 3DES, RIPEMD
MD5, SHA, RIPEMD
MDA, SHA, RIPEMD
MD5, SHA, RSA

A

MD5, SHA, RIPEMD

17
Q

symmetric algorithms

AES, MD5, RC4
AES, RSA, RC4
DSA, Blowfish, RC4
AES, Blowfish, RC4

A

AES, Blowfish, RC4

18
Q

Asymmetric algorithms

DSA, RC4, ECC
DSA, RSA, AES
DSA, RSA, ECC
DSA, RSA, SHA

A

DSA, RSA, ECC

19
Q

use the same single key to encrypt and decrypt a document; designed to encrypt and decrypt the ciphertext

digital signature
Symmetric cryptographic algorithms
ECC
Asymmetric Cryptographic Algorithms

A

Symmetric cryptographic algorithms

20
Q

public key cryptography; uses two keys (public & private) instead only one that are mathematically related

digital signature
Asymmetric Cryptographic Algorithms
Symmetric cryptographic algorithms
DHE

A

Asymmetric Cryptographic Algorithms

21
Q

an alternative for prime-number-based asymmetric cryptography for mobile and wireless devices; offers security with smaller key sizes compared to other asymmetric cryptography

hash
Key exchange
ECC
digital signature

A

ECC

22
Q

an electronic verification of the sender

digital signature
Key exchange
Diffie-Hellman (DH)
Asymmetric Cryptographic Algorithms

A

digital signature

23
Q

resolves the problem of sending and receiving keys; any method in cryptography by which cryptographic keys are exchanged between two parties, allowing use of a cryptographic algorithm.

Key exchange
diffusion
digital signature
Diffie-Hellman (DH)

A

Key exchange

24
Q

a large prime number and related integer; creating the same key

Diffie-Hellman (DH)
digital signature
AES
ECC

A

Diffie-Hellman (DH)

25
Q

the process of proving that a user performed an action such as sending an email message

non-repudiation
digest
data-in-transit
hash

A

non-repudiation

26
Q

uses elliptic curve cryptography instead of prime numbers in its computation

Diffie-Hellman (DH)
Perfect forward secrecy
Elliptic Curve Diffie-Hellman (ECDH)
Diffie-Hellman Ephemeral (DHE)

A

Elliptic Curve Diffie-Hellman (ECDH)

27
Q

public key systems that generate random public keys that are different for each session; if the secret key is compromised, it cannot reveal the contents of more than one message

Diffie-Hellman Ephemeral (DHE)
Diffie-Hellman (DH)
Perfect forward secrecy
Elliptic Curve Diffie-Hellman (ECDH)

A

Perfect forward secrecy

28
Q

statistical tools that can be used to attempt to discover a pattern in the ciphertexts, which then may be useful in revealing the plaintext text or key

known ciphertext attack
downgrade attack
deprecated algorithms
misconfiguration implementation

A

known ciphertext attack

29
Q

a hacker forces the system to abandon the current higher security mode of operation and instead fall back to implementing an older and less secure mode

deprecated algorithms
downgrade attack
collision
misconfiguration implementation

A

downgrade attack

30
Q

using cryptographic algorithm that should not be used because of known vulnerabilities

misconfiguration implementation
deprecated algorithms
collision attack
downgrade attack

A

deprecated algorithms

31
Q

asymmetric cryptography software for encrypting files and email messages; uses both asymmetric and symmetric cryptography

Pretty Good Privacy (PGP)
self-encrypting drives (SEDs)
Perfect forward secrecy
misconfiguration implementation

A

Pretty Good Privacy (PGP)

32
Q

protects all data on a hard drive; applying cryptography to an entire disk

Trusted Platform Module (TPM)
self-encrypting drives (SEDs)
full disk encryption (FDE)
Hardware Security Module (HSM)

A

full disk encryption (FDE)

33
Q

a chip on the motherboard of the computer that provides cryptographic services

Hardware Security Module (HSM)
Platform Trusted Module (PTM)
Trusted Platform Module (TPM)
self-encrypting drives (SEDs)

A

Trusted Platform Module (TPM)