Chapter 8 - Encryption Flashcards

1
Q

What are self-executing contracts?

A

Contracts with code-defined terms that execute actions automatically when conditions are met.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What are the commercial uses of blockchain?

A

Companies like IBM promote blockchain for commercial purposes, using permissioned blockchain for business transactions.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

How does blockchain enhance trust and transparency?

A

Through an immutable public ledger that ensures data integrity.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is the role of blockchain in supply chain management?

A

Provides transparency and traceability, ensuring compliance and quality control with immutable records.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is a key feature of blockchain?

A

Decentralization, which eliminates the need for central authorities.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What does an immutable ledger ensure?

A

Data integrity, as records cannot be altered or deleted.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is the digital evolution impact of blockchain?

A

It reshapes traditional systems, offering transparency, efficiency, and trust in the digital era.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is a TPM (Trusted Platform Module)?

A

A dedicated microcontroller for hardware-level security that protects digital secrets.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is the function of an HSM (Hardware Security Module)?

A

Safeguards and manages digital keys in a tamper-proof environment.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What does a Key Management System do?

A

Manages, stores, distributes, and retires cryptographic keys.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is a secure enclave?

A

A coprocessor integrated into the main processor for secure data processing and storage.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is steganography?

A

A technique that conceals a message within another to hide its existence.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is tokenization?

A

The process of substituting sensitive data with non-sensitive tokens.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is data masking?

A

The process of disguising original data to protect sensitive information.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What are cryptographic attacks?

A

Techniques used to exploit vulnerabilities in cryptographic systems.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is a downgrade attack?

A

An attack that forces systems to use weaker cryptographic standards.

17
Q

What is a collision attack?

A

An attack that finds two different inputs producing the same hash output.

18
Q

What is the Birthday Paradox in cryptography?

A

The probability that two distinct inputs will produce the same hash output.

19
Q

What is quantum computing?

A

A computing technology that uses quantum mechanics to access enormous processing power.

20
Q

What are qubits?

A

Quantum bits that can represent multiple combinations of ones and zeros simultaneously.

21
Q

What is the threat of quantum computing to traditional encryption?

A

It poses a threat by enabling rapid factorization of large prime numbers.

22
Q

What is post-quantum cryptography?

A

Cryptographic algorithms designed to be secure against quantum computing attacks.

23
Q

What is one method for creating post-quantum cryptography?

A

Increasing the key size to raise the number of permutations needed for brute force.

24
Q

What are the NIST selected post-quantum cryptography standards?

A

CRYSTALS-Kyber, CRYSTALS-Dilithium, FLACON, SPHINCS+.

25
Q

What is the NIST symmetric approved encryption standard?

A

AES (Advanced Encryption Standard) // the only widely used symmetric encryption standard

26
Q

What are the use cases for symmetric/asymmetric encryptions?

A

Symmetric:
*bulk encryption
*good efficiency with large datasets
*fast encryption

Asymmetric:
*key exchange (to continue with the symmetric)
*authentication
*digital signatures

27
Q

What are the CIAN components of asymmetric encryption?

A

C-Confidentiality: only the recipient can decrypt the data
I , A - Integrity/Authentication: creation of a hash digest of the message
N - Non repudiation through digital signature; everybody with a public key can verify senders identity

28
Q

Name the Common Asymmetric Algorithms:

A

*Diffie-Hellman - used for key exchange and VPN tunnel establishment
*RSA - key exchange, encryption, digital signatures, MFA
*ECC (Elliptic Curve Cryptography) - 6 times more efficient than RSA - therefore used for low-power computing; variants: ECDH (EC Diffie-Hellman); ECDHE (EC Diffie-Hellman Ephemeral; ECDSA (EC Digital Signature Algorithm)

29
Q

Name Common Hashing Algorithms:

A

*MD5 (Message Digest Alg 5) - legacy, not used anymore - led to collisions
*SHA (Secure Hash Algorithm) - now third iteration (SHA-3) is used (224-512 bit hash digests)
*RIPEMD (RACE Integrity Primitive Evaluation Message Digest) - opensource SHA competitor but less popular
*HMAC (Hash Based Message Authentication Code) - always paired with other hash method; checks message integrity and authenticity

30
Q

Name common Signature Algorithms:

A

*DSA (Digital Security Algorithm) - used for digital signatures
*RSA - digital signatures; encryption and key distribution (including code signing)

31
Q

Public Key Infrastructure (PKI) Components are:

A

*Certificate Authority (issuer of certificates)
*Registration Authority (middle man between users and CA)
*Certification Revocation List (CRL) -
*Online Certificate Status Protocol (OCSP) - real time alternative to CRL (faster, less secure)
*Digital Certificates - issues by CA to link a public key to an entity
*Public/Private Keys
*Key Management System (generation, storage, distribution and destruction)
*Trust Model
*End entities

32
Q

What’s a Key Escrow?

A

A secure, third-party location for storing cryptographic keys; enables key retrieval in case of loss so that encrypted data is not permanently inaccessible if lost

33
Q

What are the types of Digital Certificates?

A

*Wildcard Certificate - one certificate applies to all subdomains
*Subject Alternate Name (SAN) field - one certificate applies to not only subdomains but also a different sites related to the same Root Domain
*Single-sided Certificate - only requires one server to be validated
*Dual-sided - only for the really high security stuff; requires more processing power
*Self-Signed Certificates - for testing or closed environments
*Third Party Certificates (parties: DigiCert, GlobalSign, Sectigo, GoDaddy, Entrust)

34
Q

What is “Obsfucation”? What are the methods?

A

It’s a process of obscuring the data so when it’s captured it’s harder to extract any valuable information.
*steganography (message within a message)
*tokenization (substitution of valid data with tokens of no intrinsic value)
*data masking (disguising some parts of the information)