Chapter 4 - Basic Cryptography Concepts Flashcards

1
Q

What is the practice and study of techniques to secure communication in the presence of third parties?

A

Cryptography

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is the practice and study of determining and exploiting weakness in cryptographic techniques?

A

Cryptanalysis

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Ensuring that only authorized parties can read a message

A

Confidentiality

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Ensuring that any changes to data in transit will be detected and rejected

A

Data Integrity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Ensuring that any messages received were actually sent from the perceived origin

A

Origin Authentication

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Ensuring that the original source of a secured message cannot deny having produced the message

A

Non-repudiation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

An algorithm for performing encryption and decryption

A

Cipher

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

A cipher that substitutes one letter for another and retains the letter frequency of the original message

A

Substitution Cipher

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

A cipher based on substitution that uses multiple substitution alphabets

A

Polyalphabetic cipher

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

A cipher that rearranges or permutates letters

A

Transposition Cipher

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

A cipher also known as a Vernam cipher that is a stream cipher that applies the XOR operation to plaintext with a key

A

One-time pad

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

A mechanism that uses one-way mathematical functions to assure data integrity

A

Hashing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Three most common hash functions

A

MD5, SHA-1, and SHA-2

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

The process of disguising a message in such a way as to hide its original contents

A

Encryption

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

An attack where decryption is attempted using all possible keys

A

Brute-force

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

The effect of changing only a few bits of plaintext causing ciphertext to change completely

A

Avalanche effect

17
Q

Encryption type that uses the same key to encrypt and decrypt data

A

Symmetric encryption algorithm

18
Q

Encryption type that uses different keys to encrypt and decrypt data

A

Asymmetric encryption algorithm

19
Q

The practice of breaking codes to obtain the meaning of encrypted data

A

Cryptanalysis

20
Q

An attack where the attacker has only the ciphertext of messages encrypted using the same algorithm with no knowledge of the hidden plain text

A

Ciphertext-only attack

21
Q

An attack where the attacker has access to the ciphertext of seversal messages, but also knows something about the plain text

A

Known-plaintext attack

22
Q

An attack where the attacker chooses what data the encryption device encrypts and observes the ciphertext output

A

Chosen-plaintext attack

23
Q

An attack where the attacker can choose different ciphertext to be decrypted and has access to the decrypted plaintext

A

Chosen-ciphertext attack

24
Q

A brute-force style attack against hash functions where random input returns one of k equally likely values then by repeating the function with different inputs

A

Birthday attack

25
Q

An attack where the attacker knows a portion of the plaintext and the corresponding ciphertext

A

Meet-in-the-middle attack

26
Q

Widely used symmetric encryption algorithms

A

DES, 3DES, AES, RC4

27
Q

Common asymmetric encryption algorithms

A

RSA, DSA, EIGamal, and elliptic curve algorithms

28
Q

Method that allows two parties to share information over an untrusted network and mutually compute an identical shared secret that cannot be computed by eavesdroppers

A

Diffie-Hellman key agreement