Cryptography Flashcards

1
Q

Encryption vs Encoding

A

Encoding - transformation of data to be used on a different system
not secret
Encryption - secret

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Define a Stream Cypher vs a Block Cypher

A

Stream encrypts one bit at a time

Block encrypts one block at a time.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Define Confidentiality

A

Confidentiality is the protection of information such that only the originator and intended recipients can see the information. In essence this means data is being encrypted.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Define Authentication

A

Authentication is where the identity or authenticity of an entity (such as a user logging into a PC) is verified. The entity could be a user, message or device. User/message authentication normally pertains to the checking of a user’s/originators claimed identity.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Define Integrity (data).

A

Integrity involves mechanisms that ensure that if data has been modified, changed or deleted, the modification can be detected. This includes detection of anyone attempting to insert data into communications traffic.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Define non-repudiation.

A

Non-repudiation protects against one party in a communication exchange claiming that it never occurred. There are various forms of non-repudiation, including non-repudiation of origin and non- repudiation of receipt.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Define DES

A

Data Encryption Standard
was the first common digital encryption algorithm used extensively by businesses rather than governments.
Now obsolete

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Define 3DES

A

Triple DES was brought in after some weaknesses were found in DES, but purely as a stopgap until a brand new algorithm could be developed and standardised. Now obsolete.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Define AES

A

The Advanced Encryption Standard. Symmetric Key Algorithm.

Only publicly accessible cypher approved by the NSA

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Define RSA

A

Asymmetric Cryptography Algorithm
Rivest–Shamir–Adleman

It is based on the principle that it is easy to multiply large numbers, but factoring large numbers is very difficult. For example, it is easy to check that 31 and 37 multiply to 1147, but trying to find the factors of 1147 is a much longer process.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Define MD5

A

Message Digest Algorithm
One way.
Not collision free so not recommended for use.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Define SHA

A

Secure Hashing Algorithm
Available in SHA 1,2 and 3
1 is no longer used.
2 and 3 are collision free.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Define HMAC

A

Hash-Based Message Authentication Code

How well did you know this?
1
Not at all
2
3
4
5
Perfectly