Cryptographic Solutions Flashcards

1
Q

Practice and study of writing and solving codes

Encryption to hide information’s true meaning

A

Cryptography

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Converts plaintext to ciphertext

Provides data protection at rest, in transit, and in use

A

Encryption

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Data States

A

Data At Rest
Data in Transit
Data in Use

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Performs encryption or decryption

A

Algorithm (Cipher)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Essential for determining cipher output

A

Key

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Uses a single key for both encryption and decryption
■ Often referred to as private key encryption
■ Requires both sender and receiver to share the same secret key
■ Offers confidentiality but lacks non-repudiation
■ Challenges with key distribution in large-scale usage
● More people means more sharing of the keys

A

Symmetric Encryption

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Uses two separate keys
● Public key for encryption
● Private key for decryption
■ Often called “Public Key Cryptography”
■ No need for shared secret keys
■ Commonly used algorithms include Diffie-Hellman, RSA, and Elliptic Curve Cryptography (ECC)
■ Slower compared to symmetric encryption but solves key distribution challenges

A

Asymmetric Encryption

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Combines both symmetric and asymmetric encryption for optimal benefits
■ Asymmetric encryption used to encrypt and share a secret key
■ Symmetric encryption used for bulk data transfer, leveraging the shared secret key
■ Offers security and efficiency

A

Hybrid Approach

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Encrypts data bit-by-bit or byte-by-byte in a continuous stream
■ Uses a keystream generator and exclusive XOR function for encryption
■ Suitable for real-time communication data streams like audio and video
■ Often used in symmetric algorithm

A

Stream Cipher

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Breaks input data into fixed-size blocks before encryption
● Usually 64, 128, or 256 bits at a time
■ Padding added to smaller data blocks to fit the fixed block size
■ Advantages include ease of implementation and security
■ Can be implemented in software, whereas stream ciphers are often used in hardware solutions

A

Block Cipher

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Uses a 64-bit key (56 effective bits due to parity)
■ Encrypts data in 64-bit blocks through 16 rounds of transposition and substitution
■ Widely used from the 1970s to the early 2000s

A

DES (Data Encryption Standard)

(Symmetric Algorithm)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Utilizes three 56-bit keys
■ Encrypts data with the first key, decrypts with the second key, and encrypts again with the third key
■ Provides 112-bit key strength but is slower than DES

A

Triple DES (3DES)

(Symmetric Algorithm)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

A symmetric block cipher with a 64-bit block size
■ Uses a 128-bit key, faster and more secure than DES
■ Not as widely used as AES

A

IDEA (International Data Encryption Algorithm)

(Symmetric Algorithm)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Uses symmetric encryption algorithm that encrypts and decrypts data using a single secret key
■ Supports 128-bit, 192-bit, or 256-bit keys and matching block sizes
■ Widely adopted and considered the encryption standard for sensitive unclassified information
■ Uses single key for both encryption and decryption process
■ Replaced DES and 3DES as the US government encryption standard

A

AES (Advanced Encryption Standard)

(Symmetric Algorithm)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

A block cipher with key sizes ranging from 32 to 448 bits
■ Developed as a DES replacement but not widely adopted

A

Blowfish

(Symmetric Algorithm)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

A block cipher supporting 128-bit block size and key sizes of 128, 192, or 256 bits
■ Open source and available for use

A

Twofish

(Symmetric Algorithm)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

RC Cipher Suite (RC4, RC5, RC6)

A

Created by cryptographer, Ron Rivest
■ RC4 is a stream cipher with variable key sizes from 40 to 2048 bits, used in SSL and WEP
■ RC5 is a block cipher with key sizes up to 2048 bits
■ RC6, based on RC5, was considered as a DES replacement

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Used for cryptographic key exchange and secure key distribution over public channels
● Vulnerable to man-in-the-middle attacks, requires authentication
● Commonly used in VPN tunnel establishment (IPSec)

A

Diffie-Hellman

(Asymmetric Algorithm)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Used for key exchange, encryption, and digital signatures
● Relies on the mathematical difficulty of factoring large prime numbers
● Supports key sizes from 1024 to 4096 bits
● Widely used in organizations and multi-factor authentication

A

RSA (Ron Rivest, Adi Shamir, Leonard Adleman)

(Asymmetric Algorithm)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Efficient and secure, uses algebraic structure of elliptical curves
● Commonly used in mobile devices and low-power computing
● Six times more efficient than RSA for equivalent security

A

Elliptic Curve Cryptography (ECC)

Variants include:
○ ECDH (Elliptic Curve Diffie-Hellman)
○ ECDHE (Elliptic Curve Diffie-Hellman Ephemeral)
○ ECDSA (Elliptic Curve Digital Signature Algorithm)

(Asymmetric Algorithm)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

One-way cryptographic function that produces a unique message digest from an input

A

Hashing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

Like a digital fingerprint for the original data

■ Always of the same length regardless of the input’s length

A

Hash Digest

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

Creates a 128-bit hash value
● Limited unique values, leading to collisions
● Not recommended for security-critical applications due to vulnerabilities

A

MD5 (Message Digest Algorithm 5)

(Hashing Algorithms)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

○ Produces a 160-bit hash digest, less prone to collisions than MD5
○ Offers longer hash digests (SHA-224, SHA-256, SHA-348, SHA-512)
○ Uses 224-bit to 512-bit hash digests, more secure, 120 rounds of
computations
○ SHAE-256 is widely regarded as one of the most secure hashing algorithms due to its strong resistance to collision attacks and its large output size

A

SHA (Secure Hash Algorithm) Family

SHA-1 - 160-bit
SHA-2 - offers longer hash digests
SHA-3 - uses 2240-bit to 512-bit

(Hashing Algorithms)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

Open-source competitor to SHA but less popular

Versions available:
○ 160-bit (Most common)
○ 256-bit
○ 320-bit

A

RIPEMD (RACE Integrity Primitive Evaluation Message Digest)

(Hashing Algorithms)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

Checks message integrity and authenticity

● Utilizes other hashing algorithms (e.g., HMAC-MD5, HMAC-SHA1,
HMAC-SHA256)

A

HMAC (Hash-based Message Authentication Code)

(Hashing Algorithms)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

Uses a hash digest encrypted with a private key

■ Sender hashes the message and encrypts the hash with their private key
■ Recipient decrypts the digital signature using the sender’s public key
■ Verifies integrity of the message and ensures non-repudiation

A

Digital Signatures

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

Utilized for digital signatures

Uses a 160-bit message digest created by DSS (Digital Security Standard)

A

DSA (Digital Security Algorithm)

(Digital Signature Algorithm)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

Supports digital signatures, encryption, and key distribution

● Widely used in various applications, including code signing

A

RSA (Rivest-Shamir-Adleman)

(Digital Signature Algorithm)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q

A hacking technique that allows the attacker to authenticate to a remote server or service by using the underlying hash of a user’s password instead of requiring the associated plaintext password

A

Pass the Hash Attack

(Hashing Attack)

31
Q

Occurs when two different messages result in the same hash digest
(collision)

Collisions in hashes can be exploited by attackers to bypass
authentication systems

A

Birthday Attack

(Hashing Attack)

32
Q

Technique that is used to mitigate a weaker key by creating longer, more secure keys (at least 128 bits)

○ increases the time needed to crack the key
● Used in systems like Wi-Fi Protected Access, Wi-Fi Protected Access
version 2, and Pretty Good Privac

A

Key Stretching

(Hash Security)

33
Q

Adds random data (salt) to passwords before hashing

● Ensures distinct hash outputs for the same password due to different salts
● Thwarts dictionary attacks, brute-force attacks, and rainbow tables

A

Salting

(Hash Security)

34
Q

Adds unique, often random numbers to password-based authentication processes
● Prevents attackers from reusing stolen authentication data
● Adds an extra layer of security against replay attacks

A

Nonces (Number Used Once)

(Hash Security)

35
Q

Restricts the number of incorrect login attempts a user can make

● Increases security by deterring attackers attempting to guess passwords
● Typically, lock the account after three incorrect attempts

A

Limiting Failed Login Attempts

(Hash Security)

36
Q

An entire system involving hardware, software, policies, procedures, and people

■ Based on asymmetric encryption
■ Facilitates secure data transfer, authentication, and encrypted communications
■ Used in HTTPS connections on websites

A

PKI Components

37
Q

Refers to the encryption and decryption process using public and private keys. Only a part of the overall PKI architecture

A

Public Key Cryptography

38
Q

Encompasses the entire system for managing key pairs, policies, and trust

Involves generating, validating, and managing public and private key pairs that are used in the encryption and decryption process

Ensures the security and trustworthiness of keys

A

Public Key Infrastructure (PKI)

39
Q

Storage of cryptographic keys in a secure, third-party location

Enables key retrieval in cases of key loss or for legal investigations

A

Key Escrow

40
Q

Trusted third party that issues digital certificates and keeps the level of trust between all the certificate authorities around the world

A

Certificate Authority (CA)

41
Q

Digitally signed electronic document that binds a public key with a user’s identity

A

Digital Certificate

42
Q

Commonly used standard for digital certificates within PKI.
Contains owner’s/user’s information and certificate authority details

A

X.509 Standard

43
Q

Allows multiple subdomains to use the same certificate

● Easier management, cost-effective for subdomains
● Compromise affects all subdomains

A

Wildcard Certificate

44
Q

Certificate that specifies what additional domains and IP addresses are going to be supported. Used when domain names don’t have the same root domain

A

SAN (Subject Alternate Name) field

45
Q

Only Certificate requires the server to be validated

The other needs Both server and user to validate each other
and is used for higher security but requires more processing power

A

Single-sided and Dual-sided Certificates

46
Q

Digital certificate that is signed by the same entity whose identity it
certifies
● Provides encryption but lacks third-party trust
● Used in testing or closed systems

A

Self-Signed Certificates

47
Q

Digital certificate issued and signed by trusted certificate authorities (CAs)
● Trusted by browsers and systems
● Preferred for public-facing websites

A

Third-Party Certificates

48
Q

Highest level of trust in certificate validation
● Trusted third-party providers like Verisign, Google, etc.
● Forms a certification path for trust

A

Root of Trust

49
Q

Requests identifying information from the user and forwards certificate request up to the CA to create a digital certificate
● Collects user information for certificates
● Assists in the certificate issuance process

A

Registration Authority (RA)

50
Q

A block of encoded text with information about the entity requesting the certificate
● Includes the public key
● Submitted to CA for certificate issuance
● Private key remains secure with the requester

A

Certificate Signing Request (CSR)

51
Q

Maintained by CAs, List of all digital certificates that the certificate authority has already revoked
● Checked before validating a certificate

A

Certificate Revocation List (CRL)

52
Q

● Alternative to OCSP
● Allows the certificate holder to get the OCSP record from the server at regular intervals
● Includes OCSP record in the SSL/TLS handshake
● Speeds up the secure tunnel creation

A

OCSP Stapling

52
Q

Determines certificate revocation status or any digital certificate using the certificate’s serial number
● Faster but less secure than CRL

A

Online Certificate Status Protocol (OCSP)

53
Q

Allows an HTTPS website to resist impersonation attacks from users who are trying to present fraudulent certificates
● Presents trusted public keys to browsers
● Alerts users if a fraudulent certificate is detected

A

Public Key Pinning

53
Q

Securely store copies of private keys
● Ensures key recovery in case of loss
● Requires strong access controls

A

Key Escrow Agents

54
Q

Specialized type of software that allows the restoration of a lost or or
corrupted key to be performed
● Acts as a backup for certificate authority keys

A

Key Recovery Agents

55
Q

Shared immutable ledger for transactions and asset tracking
■ Builds trust and transparency
■ Widely associated with cryptocurrencies like Bitcoin
■ Is essentially a really long series of information with each block containing information in it

A

Blockchain

56
Q

Secure and anonymous record-keeping system
● Maintains participants’ identities
● Tracks cryptocurrency balances
● Records all genuine transactions in a network

A

Public Ledger

57
Q

Self-executing contracts with code-defined terms
● Execute actions automatically when conditions are met
● Transparent, tamper-proof, and trust-enhancing

A

Smart Contracts

(Blockchain Applications)

58
Q

Implications of Blockchain?

A

Versatility
Decentralization
Immutable Ledger
Digital Evolution

59
Q

Dedicated microcontroller for hardware-level security
● Protects digital secrets through integrated cryptographic keys
● Used in BitLocker drive encryption for Windows devices
● Adds an extra layer of security against software attacks

A

TPM (Trusted Platform Module)

60
Q

Physical device for safeguarding and managing digital keys
● Ideal for mission-critical scenarios like financial transactions
● Performs encryption operations in a tamper-proof environment
● Ensures key security and regulatory compliance

A

HSM (Hardware Security Module)

61
Q

Manages, stores, distributes, and retires cryptographic keys
● Centralized mechanism for key lifecycle management
● Crucial for securing data and preventing unauthorized access
● Automates key management tasks in complex environments

A

Key Management System

62
Q

Coprocessor integrated into the main processor of some devices
● Isolated from the main processor for secure data processing and storage
● Safeguards sensitive data like biometric information
● Enhances device security by preventing unauthorized access

A

Secure Enclaves

63
Q

Conceals a message within another to hide its very existence
● Involves altering image or data elements to embed hidden information
● Primary goal is to prevent the suspicion that there’s any hidden data at all
● Used alongside encryption for added security
● Detection is challenging due to hiding data in plain sight

A

Steganography

(Obfuscation Techniques in Data Security)

64
Q

Substitutes sensitive data with non-sensitive tokens
● Original data securely stored elsewhere
● Tokens have no intrinsic value
● Reduces exposure of sensitive data during transactions
● Commonly used for payment systems to comply with security standards

A

Tokenization

(Obfuscation Techniques in Data Security)

65
Q

Disguises original data to protect sensitive information
● Maintains data authenticity and usability
● Used in testing environments, especially for software development
● Reduces the risk of data breaches in non-production settings
● Common in industries handling personal data
● Masks portions of sensitive data for privacy, e.g., credit card digits, social security numbers

A

Data Masking (Data Obfuscation)

(Obfuscation Techniques in Data Security)

66
Q

Techniques and strategies that adversaries employ to exploit vulnerabilities in cryptographic systems with the intent to compromise the confidentiality, integrity, or authenticity of data

A

Cryptographic Attacks

67
Q

Force systems to use weaker or older cryptographic standards or protocols
■ Exploit known vulnerabilities or weaknesses in outdated versions
■ Example: POODLE attack on SSL 3.0
■ Countermeasures include phasing out support for insecure protocols and version-intolerant checks

A

Downgrade Attacks

68
Q

Find two different inputs producing the same hash output
■ Undermine data integrity verification relying on hash functions
■ Vulnerabilities in hashing algorithms, e.g., MD5, can lead to collisions
■ Birthday Paradox or Birthday Attack

A

Collision Attacks

69
Q

A computer that uses quantum mechanics to generate and manipulate quantum bits in order to access enormous processing powers.
● Uses quantum bits (qubits) instead of using ones and zeros

A

Quantum computing

70
Q

A communications network that relies on qubits made of photons (light) to send multiple combinations of ones and zeros simultaneously which results in tamper resistant and extremely fast communications

A

Quantum Communication

71
Q

A quantum bit composed of electrons or photons that can represent
numerous combinations of ones and zeros at the same time through
superposition
● Enable simultaneous processing of multiple combinations

A

Qubit

72
Q

A new kind of cryptographic algorithm that can be implemented using today’s classic computers but is also impervious to attacks from future quantum computers
● Aims to create algorithms resistant to quantum attacks

A

Post-quantum cryptography