Cryptography Flashcards
Which of the following objectives of cryptography defines the trustworthiness of data or resources in terms of preventing improper and unauthorized changes?
- Nonrepudiation
- Authentication
- Confidentiality
- Integrity
Integrity
Which of the following objectives of cryptography ensures that information is accessible only to those who are authorized to access it?
- Integrity
- Confidentiality
- Nonrepudiation
- Authentication
Confidentiality
Which of the following describes a component of public key infrastructure (PKI) where a copy of a private key is stored to provide third-party access and to facilitate recovery operations?
- Key registry
- Recovery agent
- Directory
- Key escrow
Key escrow
What is BCTextEncoder?
The BCTextEncoder utility simplifies the encoding and decoding of text data. It compresses, encrypts, and converts plaintext data into text format, which the user can then copy to the clipboard or save as a text file. It uses public key encryption methods as well as password-based encryption. Furthermore, it uses strong and approved symmetric and public-key algorithms for data encryption.
What is Hash Droid?
The Hash Droid app helps to calculate a hash from a given text or a file stored on an android device. In this application, the available hash functions are Adler-32, CRC-32, Haval-128, MD2, MD4, MD5, RIPEMD-128, RIPEMD-160, SHA-1, SHA-256, SHA-384, SHA-512, Tiger, and Whirlpool.
What is HashMyFiles?
HashMyFiles is a utility that allows you to calculate the MD5 and SHA1 hashes of one or more files in the system. It allows you to copy the MD5/SHA1 hash list to the clipboard or save it in a text/html/xml file. You can launch HashMyFiles from the context menu of Windows Explorer and display the MD5/SHA1 hashes of the selected files or folders
What is a block cipher?
Block ciphers use deterministic algorithms operating on a block (a group of bits) of fixed size with an unvarying transformation specified by a symmetric key. Most modern ciphers are block ciphers
What is a substitution cipher?
In a substitution cipher, the user replaces units of plaintext with ciphertext according to a regular system. The units may be single letters, pairs of letters, or combinations of them, and so on. Rot13, for example, is a substitution cipher.
What is a transposition cipher?
In a transposition cipher, letters in the plaintext are rearranged according to a regular system to produce the ciphertext. For example, “CRYPTOGRAPHY” when encrypted becomes “AOYCRGPTYRHP.”
What is a stream cipher?
A stream cipher is a symmetric-key cipher, where symmetric-key ciphers are plaintext digits combined with a key stream (pseudorandom cipher digit stream). Here, the user applies the key to each bit, one at a time. Examples include RC4, SEAL, etc
What is the serpent cipher comprised of?
Serpent is a symmetric-key block cipher that was a finalist in the AES contest
- It uses a 128-bit symmetric block cipher with key sizes of 128, 192, or 256 bits
What is the TEA cipher comprised of?
The tiny encryption algorithm (TEA) was created by David Wheeler and Roger Needham, and it was publicly presented for the first time in 1994. It is a simple algorithm, easy to implement in code.
- It is a Feistel cipher that uses 64 rounds.
What is the GOST cipher comprised of?
The GOST (Government Standard) block cipher, also called Magma, is a symmetric-key block cipher having a 32-round Feistel network working on 64-bit blocks with a 256-bit key length.
What is the Camelia cipher comprised of?
Camellia is a symmetric-key block cipher having either 18 rounds (for 128-bit keys) or 24 rounds (for 256-bit keys). It is a Feistel cipher with a block size of 128 bits and a key size of 128, 192, and 256 bits.
Which of the following is an encryption technique where math operations are performed to encrypt plaintext, allowing users to secure and leave their data in an encrypted format even while the data are being processed or manipulated?
- Hardware-based encryption
- Quantum cryptography
- Elliptic curve cryptography
- Homomorphic encryption
Homomorphic encryption