Chapter 8: Cryptography Flashcards

1
Q

Cryptographic algorithms that use two different keys - one key to encrypt and another to decrypt.

A

Asymmetric cipher

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

An authentication protocol that periodically reauthenticates.

A

Challenge Handshake Authentication Protocol (CHAP)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

When two different inputs into a cryptographic hash produce the same output.

A

Collision

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

A function that is one-way (nonreversible), has a fixed length output, and is collision resistant.

A

Cryptographic hash

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

A pseudo-random number generator is an algorithm used to generate a number that is sufficiently random for cryptographic purposes.

A

PRNG

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

A table of precomputed hashes used to guess passwords by searching for the hash of a password.

A

Rainbow table

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Bits added to a hash to make it resistant to rainbow table attacks.

A

Salt

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Any cryptographic algorithm that uses the same key to encrypt and decrypt.

A

Symmetric cipher

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

This standard is the most widely used standard for digital certificates.

A

X.509

How well did you know this?
1
Not at all
2
3
4
5
Perfectly