Cryptography Flashcards

1
Q

What is the CIA triad?

A
  1. Confidentiality

Prevention of unauthorized disclosure of information

  1. Integrity

Prevention of unauthorized modification of information

  1. Availability

Prevention of unauthorized withholding of services & resources

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is vulnerability, threat and attack?

A

Vuln: weakness in system that can be exploited

Threat: potential exploitation of vuln

Attack: attempted exploitation of vuln

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What are the 3 types of cryptography?

A

Symmetric, Asymmetric, Hashing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What are examples of symmetric cryptography?

A

Substitution: replace character with another according to pattern

Transposition: character shifted in regular pattern to different positions

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

How to ensure cryptography works?

A

Ensure secrecy is in the key only.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is the problem with symmetric cryptography?

A

Need to share key between sender & receiver.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is asymmetric cryptography?

A
  • Uses one key pair for encryption & decryption
  • One as private, one public.
  • Key generation is 1-way, not possible to derive private from public key.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What are two ways of asymmetric authentication?

A
  1. Public key encrypts, private key decrypts -> confidentiality
  2. Private key encrypts, public key decrypts -> authentication
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What are one-way functions?

A

One way functions are when it is computationally infeasible to get private key from the public key.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What are three techniques to break ciphers?

A

Bruteforce -> try all possible keys

Frequency analysis -> based on English text structure, focus on digraphs & trigraphs

Known plaintext -> need access to crypto engine (side channels), inject known plaintext and observe output cipher text.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What are hashing functions?

A

One way function that takes arbitrary length input and convert them into fixed length outputs.

Same input always result in same hash.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What are the properties of secure hashes?

A
  1. One-way property where it is computationally infeasible to find a message given a hash code.
  2. Strong collision resistance where it is computationally infeasible to find two different messages that hash to the same hash value.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is a digital signature system?

A

Hash of a document encrypted with sender’s private key (signed/authenticated) and recipient decrypt the encrypted hash and check it against the hash of the document to see if it matches.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly