Chapter 6 (Domain 2: Asset Security) Flashcards

1
Q

Caesar cipher

A

Julius Caesar to communicate with Cicero.
Also known as the ROT3 (or Rotate 3) cipher.
The Caesar cipher is a substitution cipher that is mono-alphabetic

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Enigma

A

German military-industrial complex adapted a commercial code machine nicknamed Enigma

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Ultra

A

The Allied forces began a top-secret effort known by the code name Ultra to attack the Enigma codes.
The Allies, led by Alan Turing, successfully broke the Enigma code in 1940

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What are the 4 fundamental goals of cryptographic systems?

A
  • Confidentiality
  • Integrity
  • Authentication
  • Nonrepudiation
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Two main types of cryptosystems enforce confidentiality

A
  • Symmetric cryptosystems use a shared secret key available to all users of the cryptosystem.
  • Asymmetric cryptosystems use individual combinations of public and private keys for each user of the system.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

How is message integrity enforced?

A

The use of encrypted message digests, known as digital signatures, created upon transmission of a message.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Nonrepudiation

A

Nonrepudiation provides assurance to the recipient that the message was originated by the sender and not someone masquerading as the sender. It also prevents the sender from claiming that they never sent the message in the first place

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

How is nonrepudiation enforced?

A
  • Nonrepudiation is offered only by public key, or asymmetric, cryptosystems
  • Secret key, or symmetric key, cryptosystems (such as simple substitution ciphers) do not provide this guarantee of nonrepudiation.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Kerckhoffs’s principle

A

(Also known as Kerckhoffs’s assumption) is that a cryptographic system should be secure even if everything about the system, except the key, is public knowledge. The principle can be summed up as “The enemy knows the system.”

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Cryptography

A

The art of creating and implementing secret codes and ciphers is known as cryptography

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Cryptanalysis

A

The study of methods to defeat codes and ciphers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Cryptology

A

Together, cryptography and cryptanalysis are commonly referred to as cryptology

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Boolean: AND

A

The AND operation (represented by the ∧ symbol) checks to see whether two values are both true
- Only one combination has 2 values are both true: 1 AND 1 is 1

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Boolean: OR

A

The OR operation (represented by the ∨ symbol) checks to see whether at least one of the input values is true
- The only time this is False is when both inputs are false

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Boolean: NOT

A

The NOT operation (represented by the ∼ or ! symbol) simply reverses the value of an input variable.
- Gives the opposite value

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Boolean: XOR

A

The XOR function returns a true value when only one of the input values is true
- If both values are false or both values are true, the output of the XOR function is false

17
Q

Modulo

A

The modulo function is the remainder value left over after a division operation is performed.