Chap 1 and 2 Flashcards

1
Q

Cryptanalysis

A

Technique of decoding messages from a non-
readable format back to readable format
without knowing how they were initially
converted from readable format to non-
readable format

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Minimum bit size for Symmetric and Asymmetric Encryption

A

256 and 2048 bits

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Cryptography

A

Art of achieving security by encoding a message from a readable format to non-readable format

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Order of hardest to easiest attack

A

Known Cipher text
Known plaintext
Chosen plaintext
Chosen ciphertext
Chosen text

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Confusion vs Diffusion

A

Confusion - protect relationship between ciphertext and key
Diffusion - protect relationship between ciphertext and plaintext

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Confidentiality

A

Assurance that only authorized parties or intended recipients have access to certain info

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Authentication

A

Assures the identity of all communicating parties and identify sender and receiver of the message.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Integrity

A

Assures that message has not been modified by unauthorized parties

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Availability

A

Assures that user authentication systems are always available

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Non-repudiation

A

Assures the non-deniability of communications

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Access control

A

Defines who can access what
Access control matrix
Access control list

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Active attacks

A

Modification of original message or send false message
Modification - Replay attack, alteration
Denial of service - DDOS
Fabrication - attack on authentication

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Problems with symmetric key encryption

A
  1. How can we distribute the keys securely
  2. Many keys need to be used
  3. Key management
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

How to prevent DFH MITM attack

A

Both parties must mutually authenticate with one another before exchanging information

How well did you know this?
1
Not at all
2
3
4
5
Perfectly