CISSP Domain 4 – Cryptography Flashcards

1
Q

ROT13

A

A more recent encryption method used in the 1980s, ROT13, was really the same thing as a Caesar cipher. Instead of shifting 3 spaces in the alphabet, the encryption process shifted 13 spaces. The idea was that if you were interested in reading something potentially “offensive” you could simply use the shift-13 approach and read the material. Other people who did not want to view it would not be offended.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Cryptanalysis

A

is the science of studying and breaking the secrecy of encryption processes, compromising authentication schemes, and reverse-engineering algorithms and keys.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Cryptology.

A

the study of cryptanalysis and cryptography.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

• Algorithm

A

Set of mathematical and logic rules used in cryptographic functions

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

• Cipher

A

Another name for algorithm

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

• Cryptography

A

Science of secret writing that enables an entity to store and transmit data in a form that is available only to the intended individuals

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

• Cryptosystem

A

Hardware or software implementation of cryptography that contains all the necessary software, protocols, algorithms, and keys

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

• Cryptanalysis

A

Practice of uncovering flaws within cryptosystems

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

• Cryptology

A

The study of both cryptography and cryptanalysis

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

• Encipher

A

Act of transforming data into an unreadable format

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

• Decipher

A

Act of transforming data into a readable format

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

• Key

A

Sequence of bits that are used as instructions that govern the acts of cryptographic functions within an algorithm

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

• Key clustering

A

Instance when two different keys generate the same ciphertext from the same plaintext

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

• Keyspace

A

A range of possible values used to construct keys

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

• Plaintext

A

Data in readable format, also referred to as cleartext

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

• Substitution cipher

A

Encryption method that uses an algorithm that changes out (substitutes) one value for another value

17
Q

• Scytale cipher

A

Ancient encryption tool that used a type of paper and rod used by Greek military factions

18
Q

• Kerckhoffs’ principle

A

Concept that an algorithm should be known and only the keys should be kept secret