cryptographic concepts Flashcards
_____ is the main component of ECDHE that gives it perfect forward secrecy.
Ephemeral key
_____ uses ephemeral keys for each session which provide perfect forward secrecy.
ECDHE (ECC with D-H ephemeral mode)
Elliptic Curve Diffie Hellman Ephemeral
_____ is a framework in which encryption is used to protect an expanding collection of transactional data registered in a public ledger.
Blockchain
_____ is a trapdoor function used to generate public/private key pairs.
Elliptic Curve Cryptography (ECC)
_____ function on different physical principles as classical computing and could put the strength of current cryptographic ciphers at risk, but also has the promise of underpinning more secure cryptosystems.
Quantum computers
_____ is creating a key using thousands of rounds of hashing. Adding a salt in the hashing process makes the hash or key much stronger.
Key stretching
A _____ is where a function produces the same hash value for two different inputs.
collision
_____ is a two-way encryption algorithm in which encryption and decryption are both performed by a single secret key.
Symmetric encryption
___ is an asymmetric algorithm used to create digital signatures. It can be used to encrypt short messages.
RSA
_____ is an asymmetric algorithm used by NIST that adopts ElGamal’s algorithm. It uses the private and public keys from Diffie-Hellman in a similar way to RSA key pairs.
Digital Signature Algorithm (DSA)
_____ is a symmetric block cipher using 64-bit blocks and a 56-bit key.
Data Encryption Standard (DES)
_____ is a symmetric block cipher with a block size of 128 bits and key sizes of 128, 192, or 256 bits
Advanced Encryption Standard (AES)
This is faster and more secure than 3DES
___ is a stream cipher meaning each byte or bit of data in the plaintext is encrypted one at a time.
RC4
____ uses 64-bit blocks and a 56-bit key, but the plaintext is encrypted three times using different subkeys.
3DES
In a _____, the plaintext is divided into equal-size blocks (usually 64- or 128-bit). Each block is then subjected to complex transposition and substitution operations, based on the value of the key used.
block cipher
_____ ensures that a compromise of long-term encryption keys will not compromise data encrypted by these keys in the past.
Perfect forward secrecy
An _____ is the main component of ECDHE that makes it a perfect forward secrecy. There is a different secret key for each session during transport.
ephemeral key
_____ is a mode operation that will process the encryption in blocks using the same key. This is the simplest mod, and operates faster than CBC.
Electronic Code Book (ECB)
_____is a mode of operation utilizing an Initialization Vector (IV). The output of the first ciphertext block is combined with the next plaintext block, and repeats. This is processing intensive and must run serially, hindering performance.
Cipher Block Chaining (CBC)