Cryptographic Primitives Flashcards

1
Q

Give the 3 security properties of a hash function (D‑P‑S).

A

Determinism, Pre‑image resistance, Second pre‑image (collision) resistance.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

One‑line definition of symmetric encryption.

A

Encrypt and decrypt with the same secret key shared by sender and receiver.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Symmetric encryption: 1 pro & 1 con.

A

Pro: very fast; Con: secure key exchange required.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

One‑line definition of asymmetric encryption.

A

Encrypt with a public key, decrypt with the corresponding private key.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Asymmetric encryption: 1 pro & 1 con.

A

Pro: no pre‑shared secret; Con: slower, needs public‑key authentication to avoid MITM.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Hybrid crypto example used on the web.

A

TLS/HTTPS — public key sets up a symmetric session key; bulk data encrypted symmetrically.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Three guarantees of a digital signature.

A

Authentication, Integrity, Non‑repudiation.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Four steps to sign & verify a message.

A

Hash → Sign with private key → Send message+signature → Receiver hash & verify with public key.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Does a digital signature provide confidentiality?

A

No — it proves origin and integrity but does not hide the message contents.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Why is SHA‑256 stronger than MD5?

A

SHA‑256 collision attacks are still infeasible; MD5 collisions found quickly on standard hardware.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly