Cryptographic Flashcards

1
Q

Cryptographic algorithms that use two different keys—

one key to encrypt and another to decrypt.

A

asymmetric cipher

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

An authentication protocol that periodically reauthenticates.

A

Challenge Handshake Authentication Protocol (CHAP)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

When two different inputs into a cryptographic hash produce the same output

A

collision

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q
function that is one-way (nonreversible), has a fixed
length output, and is collision resistant.
A

cryptographic hash

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

A pseudo-random number generator is an algorithm used to generate a number that is sufficiently random for cryptographic purposes

A

PRNG

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

A table of precomputed hashes used to guess passwords by searching for the hash of a password

A

rainbow table

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Bits added to a hash to make it resistant to rainbow table attacks.

A

salt

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Any cryptographic algorithm that uses the same key to

encrypt and decrypt. DES, AES, and Blowfish are examples.

A

symmetric cipher

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

standard that is the most widely used standard for digital

certificates.

A

X.509

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is the primary organization for maintaining certificates called?

A

Certificate Autority CA

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is often used to revoke a certificate?

A

Certificate revocation list CRL

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Symmetric encryption algorithm
Block cipher operating on 64-bit blocks
Key lenght of 56 bits
Now considered insecure

A

DES

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Symmetric encryption algorithm
Block cipher operating on 64-bit bock
Effective use of 3 key lenght total of 112 bits
Considered secure

A

3DES

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Symmetric encryption algorithm
Block cipher operating on 128-bit blocks
Key lenght of 128, 192 or 256 bits
Considered secure

A

AES

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Symmetric encryption algorithm
Block cipher operating on 64-bit blocks
Key lenght anywhere between 32 and 448 bits
Not considered secure

A

Blowfish

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q
Symmetric encryption algorithm
Block cipher operating on 128-bit blocks
Key length of 128, 192 or 256 bits
Considered secure 
Replacement of Blowfish
17
Q

Symmetric encryption algorithm
Stream cipher
Variable lenght key between 40 bits and 2,048 bits
Not considered secure

18
Q

Asymmetric encryption algorithm
Variable lenght key between 1,024 and 4,096 bits
Considered secure