Chapter 3: Cryptography Flashcards

1
Q

What is the term for when a partially correct key is useless to an attacker?

A

Confusion

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is the concept where known-plaintext isn’t useful in decoding the entire plaintext?

A

Diffusion

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is the concept for when ciphertext doesn’t repeat, even when the plaintext repeats

A

Semantic security

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is an arbitrary number that can be used along with a secret key for data encryption. Also called a nonce because it can only be used once. It does not have to be secret

A

Initialization Vector (IV)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What are the popular symmetric algorithms (5)

A
AES
3DES/TDES
Blowfish
Twofish
Rivest Cipher
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What are the popular block cypher modes (7)

A
Electronic Code Book Mode (ECB)
Cipher Block Chaining Mode (CBC)
Cipher Feedback Mode (CFB)
Output Feedback Mode (OFB)
Counter Mode (CTR)
Galois Counter Mode (GCM)
Offset Codebook Mode (OCB)
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What are the popular asymmetric algorithms (4)

A

RSA
DSA
ECC
DH

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What are the popular hashing algorithms (5)

A
MD5
SHA-1
SHA-2
SHA-3
RIPEMD
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What are the popular password storage algorithms (3)

A

NTLM
bcrypt
PBKDF2

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is the most widely used Rivest Cipher

A

RC4

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Which symmetric algorithms are considered secure (3)

A

AES
Twofish
RC6

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What are the key sizes that AES and Twofish use (3)

A

128, 192 or 256-bits

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is the term for using constantly changing keys

A

ephemeral keys

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is the concept for when, if a public key is lost, it is of no use to recover ephemeral keys used in past sessions

A

Perfect Forward Secrecy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Which block cipher mode is simplest, but does not offer semantic security

A

Electronic Code Book Mode (ECB)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

In which block cypher mode can corruption of earlier cyphertext can prevent decryption of future block

A

Cypher Block Chaining Mode (CBC)

Cipher Feedback Mode (CFB)

17
Q

Which block cypher mode is like CFB, but the keystream is generated independently of previous cyphertext

A

Output Feedback Mode (OFB)

18
Q

Which block cypher mode is where each block’s encryption uses a successively incrementing counter

A

Counter Mode (CTR)

19
Q

Which block cypher mode combines Counter mode with a hash-based authentication code (HMAC), which prevents against chosen cyphertext attacks? It works on 128 bit blocks, which makes it popular for AES, but doesn’t work on 3DES and Blowfish

A

Galois Counter Mode (GCM)

20
Q

Which block cypher mode is supported by WPA3 Enterprise wiresless

A

Galois Counter Mode (GCM)

21
Q

Which block cypher mode applies MAC and encryption in a single pass, which increases performance, and is simple to use. However, it is under patent protection, making it harder to use than the open standards?

A

Offset Codebook Mode (OCB)

22
Q

Which asymmetric algorithm has a key as large as 4096, is often used for symmetric key exchange, and is the default algorithm for SSL/TLS certificates?

A

RSA

23
Q

Which asymmetric algorithm uses a different one-way problem called a discrete logarithm. It has a strength similar to RSA, but can be faster for some applications. The default 1024 bit key length is no longer considered secure?

A

Digital Signature Algorithm (DSA)

24
Q

Which asymmetric algorithm is based off the difficulty of calculated specific properties of elliptical curves, stronger with shorter keys, and is primarily used in phones?

A

Elliptic Curve Cryptography (ECC)

25
Q

Which asymmetric algorithm is primarily used for key exchanges where each party is able to independently derive the same shared secret? Also called a key agreement.

A

Diffie-Hellman (DH)

26
Q

In DH, which key exchange provides perfect forward secrecy?

A

ephemeral key (DHE)

27
Q

What object is a secret value that is stored separately from the password data. Usually is a single value, and helps make weak passwords stronger?

A

Pepper

28
Q

What is a hash of a message that is then encrypted, which verifies both the message integrity and authenticity?

A

Keyed-hash message authentication code (HMAC)

29
Q

Which hashing algorithms are considered secure (3)

A

SHA-2
SHA-3
Race Integrity Primitives Message Digest RIPEMD

30
Q

What is different between SHA-2 and SHA-3

A

The mathematics algorithms

31
Q

What are the two most popular hash sizes of SHA-2

A

256-bit and 512-bit

32
Q

Which password storage algorithm (with version number) is included in every Windows version. It improved the login process over previous versions by adding HMAC-MD5 hashes

A

NT Lan Manager version 2 (NTLMv2)

33
Q

Which password storage algorithm is based on the blowfish key setup process. It combines passwords with a 128-salt to create a 184-hash. It is also useful for key-derivation and key-stretching

A

bcrypt

34
Q

Which password storage algorithm is designed by RSA and published as an IETF standard. It supports many underlying hashes, ciphers and HMACs, but is not considered as strong as bcrypt.

A

Password-Based Key Derivation Function 2 (PBKDF2)

35
Q

What is combined with the hashing process to create an HMAC?

A

A shared secret, such as a key or password