Cryptographic Solutions Flashcards

1
Q

Cryptographic Solutions

A

practice of writing code to hide the true meaning of information

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Cipher

A

algorithm that performs encryption or decryption

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Key

A

the piece of information that determines the output of a cipher

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Symmetric Algorithm

A

SINGLE KEY; both the sender and receiver must know the same shared secret key; Also called a private key algorithm

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Asymmetric Algorithm

A

TWO DIFFERENT KEYS; where different keys are used for decryption and encryption

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Hybrid Key Algorithm

A

using asymmetric algorithm to use a symmetric algorithm

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Stream cipher

A

encrypts the data bit-by-bit or byte-by-byte in a continuous stream

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Block Cipher

A

encrypts the data in fixed-sized blocks, typically 64/128/256 bits rather than one at a time

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Data Encryption Standard (DES)

A

breaks the input into 64-bit blocks and uses transposition and substitution to create cipher text with a key length of 56-bits

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Triple DES (3DES)

A

uses three separate keys in the process of encrypt → decrypt → encrypt in that order using each key

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

International Data Encryption Algorithm (IDEA)

A

breaks the input into 64-bit blocks with a key size of 128-bits; Blows

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Advanced Encryption Standard (AES)

A

breaks the input input (128,192,256)-bit blocks with the same key size

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Blowfish

A

uses 64-bit blocks and a variable (23-448) length encryption keys

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Twofish

A

uses 128 bit blocks and uses 128, 192, 256 bit encryption keys.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

RC cipher suite

A

The rivist ciphers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

RC1, RC2, RC3

A

sucked

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

RC4

A

a stream cipher with 40 - 2048 bit size that is used in SSL and WEP.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

RC5

A

a block cipher that key size is up to 2048 bits

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

RC6

A

based on the RC5, but was overshadowed by AES

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Asymmetric algorithms

A

encrypt plain text with the target’s public key and then the target can decrypt this with the private key.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Digital Signature

A

a hash digest of a message encrypted with the sender’s private key to ensure non-repudiation.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

Private Key Encrypts. Public Key Decrypts

A

(Digital Signatures)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

Public Key Encrypts. Private Key Decrypts.

A

(Secure Message Communication)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

Diffie-Hellman (DH)

A

used to conduct key exchanges and secure key distributions over its unsecured network, used for a key exchange inside of a VPN tunnel.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
RSA
relies on the mathematical difficulty of factoring large prime numbers can support key sizes of 1024 through 4096 bit lengths.
26
Elliptic curve cartography (ECC)
Use heavily in mobile devices and based on the elliptic curves or finite fields to determine its keys. A 256-bit ECC key is as secure as a 2048-bit RSA key.
27
Elliptic curve Diffie-Hellman (ECDH)
ECC version of the Diffie-Hellman.
28
Elliptic curve Diffie-Hellman ephemeral (ECDHE)
uses a different key for for each portion of key creation process in the DH key exchange
29
Elliptic curve digital signature algorithm (ECDSA)
30
SHA-MD5
creates a 128-bit hash value that is unique to the input file, collisions can occur.
31
SHA-1
creates a 160-bit hash digest
32
SHA-2
family of hash functions that create large hash digest bit lengths specified by their name (SHA-224, SHA-256, SHA-384, SHA-512) These can go through 64-80 rounds of mathematical computations.
33
SHA-3
Between 224-512 bits with 120 rounds of computation.
34
RIPEMD (RACE Integrated Primitive Evaluation Message Digest)
comes in 160, 256, 320 bit versions.
35
RIPEMD-160
the open source commonly known of the RIPEMD family.
36
HMAC (Hash-based message Authentication Code)
It checks the integrity of a message and provides a level of assurance. Used mostly in combo of other hashing algorithms.
37
Pass the hash attack
Allows the hacker to use a shared hash password to authenticate the remote server's services from the target PC. No need to know the plain text password. Windows exploit.
38
Birthday attack
occurs when a hacker is able to send two different messages through a hash algorithm and get the same hash digests this now becomes two of the same passwords
39
Key stretching
Mitigate a weaker key by repeatedly applying a hash function in a loop
40
Salting
Adding random data into a one-way hash to help protect
41
Dictionary attack
Every word from a predefined list
42
Brute force attack
try every password combination
43
Rainbow tables
pre-computed tables for reversing cryptographic hash functions
44
Nonce
adding a unique, random number, added to a password-based authentication process
45
Public Key Infrastructure
an entire system of hardware, software, policies, procedures, and people based on the asymmetric encryption.
46
Public Key Cryptography
is the actual process of the decryption and encryption inside a PKI.
47
Certificate Authority
the third-party vendor that issues and protects digital certificates.
48
Key Escrow
where cryptographic keys are stored in a same third-party location.
49
Digital Certificate
a digitally signed document that binds a public key with a user's identity
50
Wildcard Certificate
allows all of the subdomains to use the same public key certificate and display as valid. If the server gets leaked, then every domain will shut down until a new certificate is given.
51
Subject Alternate Name (SAN)
Certificate that applies multiple domains and IP addresses linked to it. Contains wildcard domains.
52
Single-sided certificate
only requires the server to be validated.
53
Dual-sided certificate
requires both the server and user to be validated.
54
Self signed certificate
the same entity it certifies
55
Third party certificate
issued and signed by a trusted certificate authority.
56
Root of trust
each certificate is validated using the concept of chain of trust. Basically, if you get a certificate from a website that pushes you to the CA, if we can trust the CA, we can trust the website.
57
Registration authority
requests identifying information from the user and forwards the request to the CA to create the digital certificate.
58
Certificate signing request (CSR)
block of encoded text that contains information about the entity requesting the certificate. The private key is never shared.
59
Certificate Revocation List
an online list of digital certificates that had its CA has revoked.
60
OCSP
An online lookup for the revocation status of a certificate.
61
OCSP Stapling
allows the certificate holder to get the OCSP at regular intervals.
62
Public Key Pinning
an HTTPS website can present a set of trusted keys in its header so when the certificate comes from the CA, you can check it as is.
63
Key Recovery Agent
specialized type of software that allows restoration of a key.
64
Blockchain
shared immutable (Unchangeable) ledger for recording transactions,tracking assets and truth
65
Public Ledger
record keeping system that maintains participant's identity securely and anonymous.
66
Smart Contracts
self-executing contracts where the terms of agreement or conditions are written directly into lines of code. Cannot be altered.
67
Permissioned Blockchain
used for business transactions with public ledgers.
68
TPM (Trusted Platform Module)
dedicated micro controller designed to secure hardware through any system. Integrated cryptographic keys.
69
HSM (Hardware Security Module)
physical device that safeguards and manages digital keys, also gives the accelerated operation speeds.
70
Secure Enclave
a processor embedded in devices with the sole purpose of data protection.
71
Stenography
concealing a message within another so that the existence is hidden.
72
Ionization
computing data elements with equivalents called tokens.
73
Data Masking
protect data by ensuring it remains unrecognizable but doesn't include sensitive info.
74
Cryptographic Attacks
techniques to exploit vulnerabilities in the systems to compromise the CINAA
75
Downgrade Attack
make the system use a weaker/older cryptographic standard/protocol than what it's currently using.
76
Collision Attack
find two different inputs that produce the same hash outputs
77
Quantum computing
uses quantum mechanics to manipulate and generate quantum bits.
78
Quantum communication
relies on q bits made of photons to send multiple combinations of ones and zeros simultaneously.
79
Qubit
composed of electrons or and or photons that can represent numerous combinations of ones and zeros at the same time.
80
Post Quantum Cryptography
Algorithms that can be used on a Classic PC when the robots arise.