Chapter 8: Cryptography Flashcards

1
Q

Cryptography

A

practice of storing and transmitting info in a form only authorized parties understand

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

plaintext

A

form of a readable message

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

ciphertext

A

encrypted form of a message

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Cryptographic algorithms

A

mathematical rules to dictate functions of enciphering and deciphering

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Cryptanalysis

A

name collectively given to techniques aimed to weaken or defeat cryptography

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Nonrepudiation

A

service that ensures the sender cannot later falsely deny sending a message

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

keyspace

A

the range of possible keys

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Larger keyspace or full use of the keyspace

A

allows more-random keys to be created which provides more protection

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Two basic types of encryption mechanisms used in symmetric ciphers

A

substitution and transposition

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Substitution cipher

A

change a character (or bit) out for another

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Transposition cipher

A

scramble the characters (or bits)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

polyalphabetic cipher

A

uses more than one alphabet to defeat frequency analysis

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

key

A

random string of bits inserted into an encryption algorithm; the result determines what encryption functions will be carried out on a message and in what order

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Using the same key for encryption and decryption

A

symmetric key algorithms

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Using different keys for encryption and decryption

A

asymmetric key algorithms

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Challenges with symmetric key encryption

A

secure key distribution; scalability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Benefits of symmetric key algorithms

A

perform much faster than asymmetric key algorithms

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Symmetric key algorithms provide confidentiality

A

but do not provide authentication or nonrepudiation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Examples of symmetric key algorithms

A

AES and ChaCha20

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Asymmetric algorithms typical use

A

to encrypt keys

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Symmetric algorithms typical use

A

to encrypt bulk data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

Asymmetric key algorithms provide

A

authentication and nonrepudiation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

Disadvantages of asymmetric key algorithms

A

much slower than symmetric key algorithms

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

Examples of asymmetric key algorithms

A

RSA, ECC, and DSA

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

Two main types of symmetric algorithms

A

Stream ciphers; Block ciphers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

Stream ciphers

A

use a keystream generator and encrypt a message one bit at a time

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

Block cipher

A

divides the message into groups of bits and encrypts them

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

Algorithms are publicly known. the secret part of the process is the …

A

key provides the necessary randomization to encryption

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

RSA

A

asymmetric algorithm developed by Rivest, Shamir, and Adleman; the de facto standard for digital signatures

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q

ECCs

A

Elliptic curve cryptosystems

31
Q

Elliptic curve cryptosystems

A

used as asymmetric algorithms and can provide digital signatures, secure key distribution, and encryption functionality; use fewer resources, so better for wireless device and cell phone encryption use

32
Q

Quantum cryptography

A

study that applies quantum mechanics to perform cryptographic functions; quantum key distribution is the application of this

33
Q

QKD

A

quantum key distribution; generates and securely distributes encryption keys of any length between two parties

34
Q

Hybrid system

A

when symmetric and asymmetric key algorithms are used together; asymmetric algorithm encrypts the symmetric key, and symmetric key encrypts the data

35
Q

session key

A

symmetric key used by the sender and receiver of messages for encryption and decryption purposes; only good while that communication session is active and then it is destroyed

36
Q

PKI

A

public key infrastructure; framework of programs, procedures, protocols, and public key cryptography to enable a diverse group of individuals to communicate securely

37
Q

CA

A

certificate authority; trusted third party that generates and maintains user certificates, which hold public keys

38
Q

CRL

A

certification revocation list; keeps track of revoked certificates

39
Q

certificate

A

mechanism the CA uses to associate a public key to a person’s identity

40
Q

RA

A

registration authority; validates user’s identity and then sends the request for a certificate to the CA. RA cannot generate certificates

41
Q

one-way function

A

mathematical function easier to compute in one direction than in the opposite direction

42
Q

RSA computing

A

based on a one-way function that factors large numbers into prime numbers; only the private key knows how to use the trapdoor and how to decrypt messages which were encrypted with the public key

43
Q

Hashing algorithms provide …

A

data integrity only

44
Q

Message digest

A

produced when a hash algorithm is applied to a message

45
Q

digital signature

A

a message is hashed and creates a message digest, which is signed by a private key to produce a digital signature

46
Q

Examples of hashing algorithms

A

SHA-1, SHA-2, SHA-3 and MD5

47
Q

SHA produces … bit hash value and is used in …

A

160-bit hash value and is used in DSS

48
Q

birthday attack

A

attack on hashing functions through brute force; attacker tries to create two messages with the same hashing value

49
Q

one-time pad

A

a pad with random values that are XORed against the message to produce ciphertext; pad is at least as long as the message itself and is used once and then discarded

50
Q

digital signature

A

result of a user signing a has value with a private key; provides authentication, data integrity, and nonrepudiation

51
Q

the act of signing

A

the actual encryption of the value with the private key

52
Q

ciphertext-only attacks

A

involve analyzing the ciphertext of one or more messages encrypted with the same algorithm and key to discover the key that was used

53
Q

known-plaintext attack

A

attacker has the plaintext and corresponding ciphertext of one or more messages and wants to discover the key that was used to decrypt future encrypted messages

54
Q

chosen-plaintext attack

A

similar to known-plaintext attack, but attacker chooses the plaintext that gets encrypted to see the corresponding ciphertext and then discover the key

55
Q

chosen-ciphertext attack

A

similar to chosen-plaintext attack but the attacker chooses the ciphertext and then gets to see the corresponding decrypted plaintext to then discover the key

56
Q

frequency analysis

A

statistical attack; identifies statistically significant patterns in the ciphertext generated by a cryptosystem

57
Q

Implementation attacks

A

techniques used to exploit defects in the implementation of a cryptosystem

58
Q

Side-channel attacks

A

analyze changes in the environment around a cryptosystem in an attempt to infer an encryption key whose processing causes those changes

59
Q

Timing attacks

A

side-channel attacks that use time measurements to determine the inner workings, states, and even data flows within a cryptosystem

60
Q

Fault injection attacks

A

attempt to cause errors in a cryptosystem in an attempt to recover or infer the encryption key

61
Q

MitM attacks

A

man-in-the-middle attacks; threat actors intercept an outbound secure connection request from clients and relay their own request to the intended servers, terminating both and acting as a proxy

62
Q

Pass the hash

A

type of attack against Microsoft Windows Active Directory in which the attacker resubmits cached authentication tokens to gain illicit access to resources

63
Q

Ransomware

A

type of malware that encrypts victims’ files and holds them ransom until a payment is made to an account controlled by the attacker

64
Q

Goal of Cryptanalysis

A

carried out by the white hats to test the strength of the algorithm; process of trying to reverse-engineer a cryptosystem to uncover the key used

65
Q

one-way hash function

A

converts a message of arbitrary or variable length (any size) into a value of fixed length (message digest); SHA creates one of 160 bits

66
Q

US federal government algorithm developed to secure message digests

A

SHA; Secure Hash Algorithm

67
Q

DSS

A

Digital Signature Standard; the standard to create digital signatures; dictates SHA must be used and outlines the digital signature algorithms that can be used with SHA: RSA, DSA, ECDSA

68
Q

DSA

A

Data Signature Algorithm

69
Q

RSA vs DSA

A

RSA can provide data encryption, key exchange, and digital signatures; DSA only provides digital signatures

70
Q

digital signature

A

message digest encrypted with the sender’s private key

71
Q

Work factor of a cryptosystem

A

amount of time and resources necessary to break the cryptosystem or its encryption process

72
Q

Goal of a work factor

A

To be so high that an attacker could not be successful in breaking the algorithm or cryptosystem

73
Q

Purpose of one-way hashing on user passwords

A

Prevents anyone from reading passwords in plaintext; the actual password is not transmitted across the network or stored on a system in plaintext; greatly reduces the risk of an attacker being able to obtain the actual password

74
Q

RSA algorithm’ security

A

based on the difficulty of factoring large numbers into their original prime numbers; a one-way function. calculating the product is easier than identifying the prime numbers used to generate that product