Crypto Flashcards

1
Q

Security through obscurity

A

Code obfuscation, steganography, SSID broadcast suppression, substitution ciphers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

PFS (Perfect Forward Secrecy)

A

Designed to strengthen the security of session keys

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Session Key features

A

used during single session, symmetric key

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Confusion

A

Output of cryptographic function should be considerably different from the corresponding plain text

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Digital signatures provide…

A

integrity, authentication, non-repudiaiton

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Weak/deprecated crypto solutions

A

WEP, SSL, DES

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

ECC (Elliptic Curve Crypto)

A

Asymmetric, low processing, suitable for small devices

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Means for providing randomization during encryption

A

Cryptographic nonce, salting, initialization vector (IV)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

IV (Initialization Vector)

A

pseudo-random data used in combination with WEP & SSL key

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Salt

A

Additional input that increases password complexity and provides better protection against brute-force, dictionary, and rainbow table attacks (also pseudo-data added to passwords before hashing)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Asymmetric Encryption

A

Public-key paired with a private key

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

GCM (Galois/Counter Mode)

A

Provides data integrity and confidentiality

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

ECB (Electronic Codebook)

A

Simplest/weakest kind of encryption

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Symmetric encryption

A

session-key and secret-key

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Obfuscation methods

A

Steganography, XOR cipher, ROT13

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Bcrypt & PBKDF2

A

Key-stretching algorithms

17
Q

Hashing algorithms

A

MD5, RIPEMD, HMAC, SHA

18
Q

Diffie-Hellman

A

Commonly used asymmetric algorithm for exchange of symmetric keys

19
Q

DSA

A

Cryptographic standard for digital signatures

20
Q

Symmetric ciphers

A

RC4, DES, RSA, Blowfish, 3DES, Twofish

21
Q

AES features

A

symmetric, with 128, 192, and 256bit keys, block cipher

22
Q

Countermeasures against replay attacks

A

IPsec, Kerberos, and CHAP

23
Q

A cryptographic downgrade attack

A

POODLE

24
Q

Rainbow Table entry looks like…

A

Hash/password

25
Q

Cryptographic attack where the attacker has access to both the plaintext and its encrypted version

A

KPA (Known-plaintext attack)

26
Q

Birthday attacks rely on…

A

probability theory