Chapter 2 Foundations of Cryptography Flashcards

1
Q

What is cryptography?

A

Cryptography is the science of taking data, making it hidden in some way so others can’t see it, and then bringing the data back.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is the main goal of cryptography?

A

The main goal of cryptography is to provide confidentiality to information.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is obfuscation in the context of cryptography?

A

Obfuscation is the process of taking something that makes sense and hiding it so it does not make sense to the casual observer.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What are the two main techniques used in obfuscation?

A

Diffusion and confusion.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is diffusion in cryptography?

A

Diffusion makes data less visible and less obvious.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is confusion in cryptography?

A

Confusion stirs up the data, making it difficult to recognize.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What are encryption and decryption?

A

Encryption is the process of converting plain text into hidden data, while decryption is the process of converting it back to its original form.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is the Caesar cipher?

A

The Caesar cipher is one of the oldest types of cryptography, involving shifting letters by a fixed number of positions.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

How does a Caesar cipher work?

A

A Caesar cipher shifts each letter of the plaintext by a fixed number of positions down the alphabet.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is ROT5 in a Caesar cipher?

A

: ROT5 means each letter in the plaintext is shifted by 5 positions down the alphabet.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is cryptanalysis?

A

Cryptanalysis is the process of breaking encrypted codes.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is the Vigenère cipher?

A

The Vigenère cipher is a method that uses a key to apply multiple Caesar ciphers to plaintext, making it more secure.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

How does the Vigenère cipher work?

A

It uses a key to determine the shift value for each letter in the plaintext, creating a more complex encryption.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What are the two essential components of any encryption algorithm?

A

An algorithm and a key.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is exclusive OR (XOR) in binary encryption?

A

XOR is a binary operation used in some encryption algorithms where each bit of the output is the sum of the corresponding bits in the input, modulo 2.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is Kerckhoffs’s principle?

A

Kerckhoffs’s principle states that a cryptographic system should be secure even if everything about the system, except the key, is public knowledge.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Why is it important that encryption algorithms are open standards?

A

Open standards allow everyone to test and verify the security of the encryption, ensuring it is robust and not easily broken.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

What are the three components of the CIA of security?

A

Confidentiality, Integrity, and Availability.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

How is confidentiality typically achieved in security?

A

Through encryption, using methods like symmetric or asymmetric encryption, and block or stream ciphers.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

What does integrity ensure in terms of data security?

A

Integrity ensures that the data has not been altered between the time it was created and the time it is accessed.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

What is a hash function in cryptography?

A

: A hash function is a mathematical function that takes an input (or message) and returns a fixed-size string of bytes, which appears random.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

What is a message digest?

A

A message digest is the fixed-length output (or hash value) of a hash function, representing the input data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

What happens to a hash value if even a small change is made to the input?

A

The hash value will be completely different if even a small change is made to the input.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

Why are hash functions important for verifying data integrity?

A

Hash functions allow users to verify that data has not been altered by comparing hash values before and after transmission or storage.

25
Q

What is MD5?

A

MD5 (Message Digest version 5) is an older hash function that produces a 128-bit hash value, created by Ron Rivest.

26
Q

What is the main issue with MD5 and SHA-1 hash functions?

A

Both MD5 and SHA-1 are prone to collisions, where two different inputs produce the same hash value.

27
Q

What is SHA-2 and why is it important?

A

SHA-2 (Secure Hash Algorithm 2) is a family of hash functions that produce hash values of different lengths, like SHA-256 and SHA-512, and are much less prone to collisions.

28
Q

What is RIPEMD?

A

RIPEMD (RACE Integrity Primitives Evaluation Message Digest) is a family of hash functions that produce hash values of different lengths, like 128, 160, 256, and 320 bits, and is an open standard.

29
Q

How are hashes used in password storage?

A

Passwords are often stored as hash values on a system’s hard drive, rather than in plain text, to protect the actual passwords.

30
Q

How do hashes contribute to web page security?

A

Hashes are used in combination with asymmetric and symmetric encryption to protect data on encrypted web pages.

31
Q

What is the significance of a hash function producing a fixed-size output?

A

A fixed-size output ensures that the hash value is always the same length, regardless of the size of the input, which is important for consistency and security.

32
Q

What is the purpose of using hashes in downloading patches or updates?

A

Hashes ensure that the patch or update has not been tampered with during transmission, by allowing the recipient to verify the hash value against the original.

33
Q

What is a collision in hash functions?

A

A collision occurs when two different inputs produce the same hash value, which can compromise the integrity of the hash function.

34
Q

What is cryptanalysis?

A

Cryptanalysis is the study and practice of breaking cryptographic algorithms to access protected data.

35
Q

Why is it difficult to attack modern encryption algorithms like AES directly

A

Modern encryption algorithms like AES are carefully developed, publicly understood, and constantly tested for weaknesses, making them very difficult to crack.

36
Q

What is one strategy for successfully attacking an encryption system?

A

One strategy is to trick someone into using a weaker encryption algorithm instead of a stronger one, making it easier to crack the system.

37
Q

What is an example of a weak encryption algorithm that can be easier to crack?

A

Arc4 used in the WEP (Wired Equivalent Privacy) protocol is an example of a weak encryption algorithm that can be easier to crack.

38
Q

What is the significance of implementation in cryptographic attacks?

A

Poor implementation of an encryption algorithm can create weak spots that attackers can exploit, even if the algorithm itself is strong.

39
Q

What was the main issue with the WEP encryption protocol?

A

The main issue with WEP was its short key lengths and poor implementation of Arc4, which made it vulnerable to attacks.

40
Q

What percentage of wireless networks are estimated to still use WEP?

A

Approximately 5 to 8% of wireless networks are estimated to still use WEP.

41
Q

What is one way attackers can compromise encrypted data by targeting keys?

A

Attackers can use brute force attacks or other methods to discover encryption keys, giving them access to the encrypted data.

42
Q

What is the difference between a password and a key in encryption?

A

A password is often transformed into a key through processes like stretching and adding salts to make it suitable for encryption.

43
Q

What are the three main areas of focus when conducting cryptographic attacks?

A

The three main areas of focus are attacking the algorithm, attacking the implementation, and attacking the key.

44
Q

Where are passwords typically stored on a system?

A

Passwords are stored as hashes in a secure location, such as a list or database on the system.

45
Q

What is the process for verifying a password during login?

A

The system hashes the entered password and compares it to the stored hash. If they match, the user is authenticated.

46
Q

What is a brute force attack?

A

A brute force attack involves trying all possible combinations of characters to guess a password.

47
Q

What is a dictionary attack?

A

A dictionary attack uses a precompiled list of human words and common passwords to guess a password.

48
Q

What is a pre-hashed dictionary table?

A

A pre-hashed dictionary table includes both the original words and their corresponding hash values to speed up the cracking process.

49
Q

What is a rainbow table?

A

A rainbow table is a precomputed table of hash values that uses advanced math (reduction functions) to make it more efficient for searching hashes.

50
Q

How do attackers typically obtain password hashes for cracking?

A

Attackers may use bootable disks or other methods to access and copy the list of usernames and password hashes from a system for offline attacks.

51
Q

What is salting in password security?

A

Salting involves adding a random value to a password before hashing it to make precomputed attacks, like those using rainbow tables, more difficult.

52
Q

How does salting protect against rainbow table attacks?

A

Salting changes the hash value of the password, requiring attackers to regenerate the rainbow table for each unique salt value.

53
Q

What is key stretching?

A

Key stretching involves using algorithms to repeatedly hash a password and other inputs to make it more resistant to brute force attacks.

54
Q

What is an example of key stretching in wireless networks?

A

An example is the Password-Based Key Derivation Function 2 (PBKDF2) used in WPA encryption, which hashes the password multiple times with the SSID.

55
Q

What are the main types of password attacks to be aware of for exams?

A

The main types are brute force attacks, dictionary attacks, and rainbow table attacks.

56
Q

How do salting and key stretching improve password security?

A

Salting adds unique values to passwords before hashing, while key stretching increases the computational effort needed to crack passwords.

57
Q

Why are human words commonly used in passwords?

A

Human words are easier to remember, making them a frequent choice for passwords despite being more vulnerable to dictionary attacks.

58
Q
A