Chapter 14 - Cryptography Flashcards
Define an encryption algorithm?
A mathematical process that converts plaintext data into ciphertext data - often published to peer review their strength and validity.
What is Symmetric Encryption?
Data is encrypted and decrypted with the same key value.
What is Asymmetric Encryption?
Data is encrypted and decrypted using two different keys, typically a public key and a private key.
What is a Cryptographic System?
A system that includes all the necessary resources to support a particular method of encryption/decryption.
What is Cryptanalysis?
The study of cryptography in attempt to discover their strengths and weaknesses.
What is hashing?
A one-way mathematical encryption method that converts a file into a hash to check for its integrity.
A hash of the same file will always be the same.
What are examples of broken hashing algorithms that should not be used due to vulnerabilities?
MD5 (128-bit)
SHA-1 (160-bit)
What are the different bits that SHA-2 can produce?
224
256
384
512
What algorithms does SHA-3 use?
Keccak algorithms
producing 224, 256, 384, 512 bit hashes
What is a commonly used symmetric encryption algorithm?
AES
What is a Block Stream Cipher?
Data is encrypted in defined fixed-length blocks.
What is a Stream Cipher?
Data is encrypted in a stream rather than encrypting blocks of data.
What is a PKI?
Public Key Infrastructure is used to create, manage, distribute, use, store and revoke digital certificates used in public key encryption.
What is RSA?
Rivest, Shamir and Adleman
RSA is a very popular type of asymmetric encryption using large prime numbers to create secure matching public and private keys.
What is used to secure HTTPS and VPN traffic?
TLS