Chapter 3: Fundamentals of Cryptography Flashcards
What is the critical factor in cryptography?
That one or more elements must be kept secret at all costs
What are the three most common symmetric cryptographic algorithms?
AES (Advanced Encryption Standard), Blowfish, and Twofish
What is the difference between AES and Blowfish?
Blowfish uses 64-bit blocks and can have a key from 32 bits to 448 bits
AES performs on 128 bits block
How would you generate a digital signature for a message?
Generate a digest on the message and then encrypt the digest using his private key
What is a digest?
is a fixed-length string of characters obtained by applying a hash function to a message. (represents the contents)
Digest only verifies the integrity of the message not its content
What is a digital signature?
involves encrypting the message digest with the sender’s private key
What is FDE?
Full Disk Encryption
What is an example of FD?
BitLocker
What is a blockchain?
A shared, immutable ledger that facilitates the process of recording transactions and tracking assets in a business network.
What does blockchain rely on?
Uses cryptographic hash algorithms to record transactions
What is nonrepudiation?
The process of proving that a user performed an action. Preventing denials by providing undeniable proff of the action (Digital Signatures)
What is obfuscation?
the action of making something obscure, unclear, or unintelligible
What is repudiation?
refers to the denial of a commitment or action - denying an action
What is metadata?
additional information attached to encrypted data that provides context or details about the data itself, but is not part of the encrypted content itself (data about data)
What is a Collision attack?
is an attempt to find two input strings of a hash function that produce the same hash result.
What is Steganography?
To hide the existence of a message or information
What is a cyphertext attack?
Sophisticated statistical tools exist that can be used to perform an analysis of the ciphertext in an attempt to discover a pattern in the ciphertexts, which then may be useful in revealing the plaintext or key
What are the three hash algorithms that someone should use?
Whirlpool, RipeMD, and SHA-2