Chapter 7 - Cryptography Flashcards

1
Q

Unencrypted information

A

information in an understandable form, either cleartext or plaintext

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Plaintext

A

unencrypted text that gets encrypted and becomes ciphertext

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Cleartext

A

any unencrypted data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Encrypted information

A

information in scrambled form (ciphertext)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Ciphertext

A

Encrypted text that becomes plaintext when decrypted

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Algorithm

A

A repeatable process that produces the same result when the same input is received

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Open-source ciphers

A

Make it possible for experts around the world to examine ciphers for weaknesses

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Transposition ciphers

A

rearrange characters or bits of data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Substitution ciphers

A

replace bits, characters, or blocks of information with something different

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Data encryption standard

A

A symmetric key algorithm that encrypts using a 56-bit key

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

DES was…

A

once widely used but now considered outdated and easy to crack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is the goal of cryptography?

A

To make the cost or time required to access encrypted information exceed the value of the protected info

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Quantum Cryptography

A

a new form of cryptography that uses photons, particles, and waves of light,

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

How does cryptography play a role in the three tenets of cybersecurity?

A

Confidentiality - keeps information hidden from unauthorized users
Integrity - ensures that no one changes information after transmitting it
Availability - ensures info is only available to those that should have access to it

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Nonrepudiation

A

a principle ensuring that a party cannot deny having performed a specific action, like signing a document or sending a message

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Conditions for nonrepudiation

A
  • An effective asymmetric key algorithm
  • A strong hash function
  • A means to produce a digital signature
17
Q

Symmetric key ciphers

A

use the same key to encrypt and decrypt

18
Q

Asymmetric key ciphers

A

use different keys to encrypt and decrypt

19
Q

Two ways to break a cipher

A
  1. Analyze the ciphertext to find the plaintext or key
  2. Analyze the ciphertext and its associated plaintext to find the key
20
Q

Ciphertext-only attack (COA)

A

the ciphertext sample is available but not the plaintext

21
Q

Known-plaintext attack (KPA)

A

the ciphertext and associated plaintext are available

22
Q

Key

A

a value that is an input to a cryptosystem

23
Q

Keyspace

A

the number of possible keys to a cipher

24
Q

Key management is…

A

one of the most difficult and critical parts of the cryptosystem

25
Q

Rather than each organization creating the infrastructure to manage its own keys, hosts may…

A

agree to trust a common key-distribution center (KDC)

26
Q

Checksum

A

summary information appended to a message to ensure that the values of the message have not changed

27
Q

Hash Functions

A

compute a checksum of a message and combine it with a cryptographic function so that the result is tamperproof

28
Q

Characteristics of hash functions

A
  • Not reversible
  • Useful for protecting data from unauthorized change
  • designed in a way that no one can forge a message that will result in the same hash as the
29
Q

Digital signatures

A

bind the identity of an entity to a particular message or piece of information

30
Q

Characteristics of digital signatures

A
  • Ensure the integrity of a message and verify who wrote it
    • Require asymmetric key cryptography
    • Plaintext + hash algorithm + private key = digital signature
31
Q

Asymmetric keys…

A

Do not require each party to first share a secret key

32
Q

Key directory

A

A trusted repository of all public keys

33
Q

Key escrow

A

A key storage method that allows some authorized third-party access to a key under certain circumstances