Chapter 3: Fundamentals of Cryptography Flashcards

1
Q

What is the critical factor in cryptography?

A

That one or more elements must be kept secret at all costs

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What are the three most common symmetric cryptographic algorithms?

A

AES (Advanced Encryption Standard), Blowfish, and Twofish

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is the difference between AES and Blowfish?

A

Blowfish uses 64-bit blocks and can have a key from 32 bits to 448 bits
AES performs on 128 bits block

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

How would you generate a digital signature for a message?

A

Generate a digest on the message and then encrypt the digest using his private key

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is a digest?

A

is a fixed-length string of characters obtained by applying a hash function to a message. (represents the contents)

Digest only verifies the integrity of the message not its content

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is a digital signature?

A

involves encrypting the message digest with the sender’s private key

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is FDE?

A

Full Disk Encryption

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is an example of FD?

A

BitLocker

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is a blockchain?

A

A shared, immutable ledger that facilitates the process of recording transactions and tracking assets in a business network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What does blockchain rely on?

A

Uses cryptographic hash algorithms to record transactions

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is nonrepudiation?

A

The process of proving that a user performed an action. Preventing denials by providing undeniable proff of the action (Digital Signatures)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is obfuscation?

A

the action of making something obscure, unclear, or unintelligible

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is repudiation?

A

refers to the denial of a commitment or action - denying an action

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is metadata?

A

additional information attached to encrypted data that provides context or details about the data itself, but is not part of the encrypted content itself (data about data)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is a Collision attack?

A

is an attempt to find two input strings of a hash function that produce the same hash result.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is Steganography?

A

To hide the existence of a message or information

17
Q

What is a cyphertext attack?

A

Sophisticated statistical tools exist that can be used to perform an analysis of the ciphertext in an attempt to discover a pattern in the ciphertexts, which then may be useful in revealing the plaintext or key

18
Q

What are the three hash algorithms that someone should use?

A

Whirlpool, RipeMD, and SHA-2