CH24 Cryptography Flashcards

1
Q

What is Cryptography?

A

the practice and study of writing and solving codes in order to hid the true meaning of information

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is Encryption?

A

Process of converting ordinary information (plaintext) into an unintelligible form (ciphertext)

Encryption protects data at rest, data in transit, or data in use.

Data at rest – Inactive data that is archived, such as data resident on a hard disk drive.

Data in Transit – Data crossing the network or data that resides in a computer’s memory.

Data in Use – Data that is undergoing constant change

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is a cipher ?

A

an algorithm which performs the encryption or decryption

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is a Key in regards to Cryptography?

A

the essential piece of information that determines the output of a cipher

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is Symmetric key encryption?

A

you have a single key that‘s used encrypt and decrypt the data.

Confidentiality can be assured with symmetric encryption. But you can’t assure non-repudiation. If multiple people knows the key and one of the person who knows the key goes in and changes the data, you wouldn’t know who has done it. It could be anyone of the people who has the key.

Key distribution can be challenging with symmetric encryption. More users that need to share a secret, you need to be able to distribute all of these shared secret keys. As more and more people know what the keys are, there’s less and less confidentiality

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is Asymmetric encryption?

A

you’re going to get two different keys. One key to encrypt the data and the second key to decrypt it

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is Symmetric Algorithm (Private Key Encryption)?

A

Encryption algorithm in which both the sender and the receiver must know the same secret using a privately held key.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is Asymmetric Algorithm (Public Key Encryption)?

A

Encryption algorithm where different keys are used to encrypt and decrypt the data.

For the exam :
Asymmetric encryption is also known as public key cryptography.
Two keys are used in public key cryptography.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is Hybrid implementation in regards to encryption?

A

utilizes asymmetric encryption to securely transfer a private key that can then be used with symmetric encryption

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is Stream cipher?

A

perform their computations and encryption a single byte at a time. It utilizes a keystream generator to encrypt data bit by bit using a mathematical XOR function to create the ciphertext

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Block cipher

A

breaks the input into fixed-length blocks of data and performs the encryption on each block. It is easier to implement through software solution

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is Data Encryption Standard (DES) Encryption algorithm?

A

Encryption algorithm which breaks the input into 64-bit blocks and uses transposition and substitution to create ciphertext using an effective key strength of only 56-bits. Not as secure these days. DES used to be the standard for encryption.
Block cipher, Symmetric Algorithm

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is 3 DES Encryption algorithm?

A

Encryption algorithm which uses three separate symmetric keys to encrypt, decrypt, then encrypt the plaintext into ciphertext in order to increase the strength of DES

Block cipher, Symmetric Algorithm

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is 3 DES Encryption algorithm?

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is Advanced Encryption Standard (AES) Encryption algorithm?

A

Symmetric block cipher that uses 128-bit, 192-bit, or 256-bit blocks and a matching encryption key size to encrypt plaintext into ciphertext. AES is the standard for encrypting sensitive US Government data.

Block cipher, Symmetric Algorithm

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is Blowfish Encryption algorithm?

A

Symmetric block cipher that uses 64-bit blocks and a variable length encryption key to encrypt plaintext into ciphertext

Block cipher, Symmetric Algorithm

17
Q

What is Twofish Encryption algorithm?

A

Symmetric block cipher that replaced blowfish and uses 128-bit blocks and a 128-bit, 192-bit, or 256-bit encryption key to encrypt plaintext into ciphertext

Block cipher, Symmetric Algorithm

18
Q

What is Rivest Cipher (RC4) Encryption algorithm?

A

Symmetric stream cipher using a variable key size from 40-bits to 2048-bits that is used in SSL and WEP

Stream cipher, Symmetric Algorithm

19
Q

What is Rivest Cipher (RC5) Encryption algorithm?

A

Symmetric block cipher with a key sizes up to 2048-bits

Block cipher, Symmetric Algorithm

20
Q

What is Rivest Cipher (RC6) Encryption algorithm?

A

Symmetric block cipher that was introduced as a replacement for DES but AES was chosen instead

Block cipher, Symmetric Algorithm

21
Q

Exam Notes

A

For the exam : be able to identify which of these are block ciphers and which are stream ciphers. The only stream cipher is RC4. All others are block cipher.

For the exam : be able to identify the algorithm as either symmetric ciphers or asymmetric ciphers. Symmetric cyphers : DES, 3DES, IDEA, AES, Blowfish, Twofish, and the Rivest Ciphers

For the exam : Remember that Diffi-Hellmen is an asymmetric algorithm. It’s used for the key exchange inside of creating a VPN tunnel establishment as part of IPSec.

22
Q

What is Digital Signature?

A

a hash digest of a message encrypted with the sender’s private key to let the recipient know the document was created and sent by the person claiming to have sent it.

23
Q

What is Diffie-Hellman (DH) ?

A

Used to conduct key exchanges and secure key distribution over an unsecure network. Used for the establishment of a VPN tunnel using IPSec

For the exam : Remember that Diffi-Hellmen is an asymmetric algorithm. It’s used for the key exchange inside of creating a VPN tunnel establishment as part of IPSec

24
Q

What is Rivest, Shamir, and Adleman (RSA)?

A

Asymmetric algorithm that relies on the mathematical difficulty of factoring large prime numbers. RSA can use key sizes of 1024-bits to 4096-bits.

RSA is widely used for key exchange, encryption, and digital signatures

25
Q

Elliptic Curve Cryptography (ECC)

A

Algorithm that is based upon the algebraic structure of elliptic curves over finite fields to define the keys. ECC with a 256-bit key is just as secure as RSA with 2048-bit key.

▪ ECDH - Elliptic Curve Diffie-Hellman
▪ ECDHE - Elliptic Curve Diffie-Hellman Ephemeral
▪ ECDSA - Elliptic Curve Digital Signature Algorithm

ECC is most commonly used for mobile devices and low-power computing
device

26
Q

What is Pretty Good Privacy (PGP)?

A

an encryption program used for signing, encrypting, and decrypting emails. PGP uses older algorithm called, IDEA (from symmetric algorithm).

PGP is a hybrid cryptographic tool because it uses symmetric cipher for the bulk data encryption, but it uses RSA, a asymmetric cipher, to create the digital signatures used in signing its emails and to send the session keys over an untrusted network.

PGP uses key sizes of 128 bits or more for symmetric functions and key sizes between 512 bits and 2048 bits for its asymmetric function.

27
Q

What is GNU Privacy Guard (GPG) ?

A

a newer updated version of the PGP encryption suite that uses AES for its symmetric encryption functions. It is freely available and non-patented encryption solution that’s available for Linux, Windows, and Macintosh OS

28
Q

What is Key Management in regards to Cryptography?

A

refers to how an organization will generate, exchange, store, and use encryption keys.

The strength of an encryption system lies in the key strength.
Keys must be securely stored.
Keys needs to be changed periodically

29
Q

What is One-Time Pad?

A

a stream cipher that encrypts plaintext information with a secret random key that is the same length as the plaintext input

One-time pads are not commonly used

30
Q

What is Pseudo-Random Number Generator (PRNG) ?

A

a simulated random number stream generated by a computer that is used in cryptography, video games, and more

31
Q

What is Steganography ?

A

the way to hide message within other messages (or picture). Data isn’t encrypted, it’s just hidden.

32
Q

What is Blockchain?

A

a shared, immutable ledger for recording transactions, tracking assets and building trust. (Ex: cryptocurrency)

33
Q

What is Public Ledger ?

A

a record-keeping system that maintains participants’ identities in secure and anonymous form, their respective cryptocurrency balances, and a record book of all the genuine transactions executed between network participants

A permissioned blockchain is used for business transactions and promotes new levels of trust and transparency using an immutable public ledger

34
Q

What is Quantum Computing ?

A

A computer that uses quantum mechanics to generate and manipulate quantum bits (qubits) in order to access enormous processing powers

35
Q

What is Quantum Communication?

A

A communications network that relies on qubits made of photons (light) to send multiple combinations of 1s and 0s simultaneously which results in tamper resistant and extremely fast communications.

36
Q

What is Qubit ?

A

a quantum bit composed of electrons or photons that can represent numerous combinations of 1s and 0’s at the same time through superposition

37
Q

What is Post-quantum Cryptography?

A

A new kind of cryptographic algorithms that can be implemented using today’s classical computers but is also impervious to attacks from future quantum computers.

38
Q

What is Ephemeral ?

A

A cryptographic key that is generated for each execution of a key establishment process. It is short lived.

Ephemeral keys are short-lived and used in the key exchange for WPA3 to create perfect forward secrecy.

39
Q

What is Homomorphic Encryption ?

A

encryption method that allows calculations to be performed on data without decrypting it first.

It’s good thing to use with your cloud provider.

It can be used for privacy-preserving outsourced storage and computation.