Chapter 1 Flashcards

Fundamentals Recap

1
Q

What is used to encrypt individual files?

A

Aescrypt

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is used to encrypt full disks?

A

Bitlocker or FileVault

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is One-time pad?

A

is considered to be unbreakable since it only uses its cipher code once.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

PRNG (Pseudo-Random Number Generator)

A

This method repeats random numbers after a given time. They are fast and are also deterministic and are useful in producing a repeatable set of random numbers.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Frequency Analysis

A

is a cipher cracking methodology that involves identifying patterns and variations in the probability of codes.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Entropy

A

relates to the degree of uncertainty of the encryption process.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Hardware and Software encryption

A

Hardware encryption is more efficient than software encryption.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

HSM (Hardware Security Module)

A

is a tamper-evident and intrusion resistant physical device that safeguards and manages cryptographic keys and provides cryptographic processing.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

TPM Trusted Platform Module

A

is a dedicated processor that handles hardware-level encryption; allows the use of full disk encryption on a hard drive in a manner that minimizes the impact on system performance. TPM contains the encryption keys.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Enigma Machine

A

Used a polyalphabetic substitution cipher, which did not repeat within a reasonable time period, along with a secret key. For the cracking of the Enigma cipher, the challenge was thus to determine both the algorithm and secret key.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Combinations

A

not concerned with the order

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Permutations

A

all options considered including sequence

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Diffie-Hellman

A

key exchange algorithm used to exchange the secret key in symmetric cryptography

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Common block cipher modes

A

ECB, CBC, CFB, OFB, and CTR.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

CFB, OFB, and CTR allow the block cipher to operate like a stream cipher.

A

CFB, OFB, and CTR allow the block cipher to operate like a stream cipher.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Hashing

A

describes One-Way or irreversible encryption used for protecting the integrity of data.

17
Q

Hashing involves

A

taking a VARIABLE length input and producing a FIXED length output (message digest)

18
Q
A
19
Q

Similar context/ Pre-image attack

A

Part of the message has some significance to the original and generates the same hash signature.

20
Q

2 Main applications of Public Key

A

Identity checking and key protection

21
Q

RSA

A

has a heavy overhead on processor loading and is not well suited to embedded systens

22
Q

Bitcoin

A

uses ECC (Elliptic Curve cryptography) with a 32-byte private keys and 64 byte public keys.

23
Q

El Gamal

A

is a public key method that is used in both encryption and digital signing.

24
Q
A