cryptographic concepts Flashcards

1
Q

_____ is the main component of ECDHE that gives it perfect forward secrecy.

A

Ephemeral key

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

_____ uses ephemeral keys for each session which provide perfect forward secrecy.

A

ECDHE (ECC with D-H ephemeral mode)

Elliptic Curve Diffie Hellman Ephemeral

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

_____ is a framework in which encryption is used to protect an expanding collection of transactional data registered in a public ledger.

A

Blockchain

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

_____ is a trapdoor function used to generate public/private key pairs.

A

Elliptic Curve Cryptography (ECC)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

_____ function on different physical principles as classical computing and could put the strength of current cryptographic ciphers at risk, but also has the promise of underpinning more secure cryptosystems.

A

Quantum computers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

_____ is creating a key using thousands of rounds of hashing. Adding a salt in the hashing process makes the hash or key much stronger.

A

Key stretching

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

A _____ is where a function produces the same hash value for two different inputs.

A

collision

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

_____ is a two-way encryption algorithm in which encryption and decryption are both performed by a single secret key.

A

Symmetric encryption

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

___ is an asymmetric algorithm used to create digital signatures. It can be used to encrypt short messages.

A

RSA

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

_____ is an asymmetric algorithm used by NIST that adopts ElGamal’s algorithm. It uses the private and public keys from Diffie-Hellman in a similar way to RSA key pairs.

A

Digital Signature Algorithm (DSA)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

_____ is a symmetric block cipher using 64-bit blocks and a 56-bit key.

A

Data Encryption Standard (DES)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

_____ is a symmetric block cipher with a block size of 128 bits and key sizes of 128, 192, or 256 bits

A

Advanced Encryption Standard (AES)

This is faster and more secure than 3DES

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

___ is a stream cipher meaning each byte or bit of data in the plaintext is encrypted one at a time.

A

RC4

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

____ uses 64-bit blocks and a 56-bit key, but the plaintext is encrypted three times using different subkeys.

A

3DES

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

In a _____, the plaintext is divided into equal-size blocks (usually 64- or 128-bit). Each block is then subjected to complex transposition and substitution operations, based on the value of the key used.

A

block cipher

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

_____ ensures that a compromise of long-term encryption keys will not compromise data encrypted by these keys in the past.

A

Perfect forward secrecy

17
Q

An _____ is the main component of ECDHE that makes it a perfect forward secrecy. There is a different secret key for each session during transport.

A

ephemeral key

18
Q

_____ is a mode operation that will process the encryption in blocks using the same key. This is the simplest mod, and operates faster than CBC.

A

Electronic Code Book (ECB)

19
Q

_____is a mode of operation utilizing an Initialization Vector (IV). The output of the first ciphertext block is combined with the next plaintext block, and repeats. This is processing intensive and must run serially, hindering performance.

A

Cipher Block Chaining (CBC)