Cryptography Flashcards

1
Q

What is cryptanalysis?

A

The art of cracking encryption.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

A key is added to what when trying to encrypt some plaintext?

A

Encryption works by adding a key to a cypher.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is key stretching or key strengthening?

A

Making a weak key stronger by performing multiple processes.

Like hashing a password, and then hashing the hash of a password, etc.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What are two common key stretching libraries?

A

bcrypt

PBKDF2

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is homomorphic encryption? (HE)

A

With homomorphic encryption you are able to perform calculations of data while it is still encrypted, and perform the work directly on the encrypted data, and save the results in an encrypted form, while having never decrypted the data.
It can still only be decrypted with a private key.
This is useful for data in the cloud and keeping the data always in an encrypted form.
This is also useful for people to be able to perform actions on data and get research information from the data without ever having access to the original data source.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is ECC in cryptography?

A

Elliptic curve cryptography.
A way of creating keys with curves instead of giant numbers.
A great cryptography solution for devices with smaller storage or less computing power. (Phones/IoT)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Whats is PFS in cryptography? or perfect forward secrecy

A

Perfect forward secrecy changes the encryption process to where you are not using the same private key every single time, commonly used on web servers.
Uses an algorithm called ‘elliptic curve diffie-hellman ephemeral’
Keys are created just to transfer for a single session and then once that session is over those keys are no longer used. This means that every session will have a different set of keys.
Not all servers are going to have the bandwidth or strong enough computing power to use PFS.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is the primary difference between quantum computers and regular computers?

A

The smallest form of information in classic computing would be a “bit” (1,0)
While in quantum computing it is a “qubit” which is able to effectively be both 1 and 0 at the same time.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is the different between stream and block ciphers?

A

Stream ciphers will encrypt one bit or byte at a time, whereas block ciphers will encrypt fixed-length blocks like 64bits or 128bit blocks one at a time.
Stream ciphers and block ciphers will typically will usually be used with symmetric encryption and are relatively fast and can be used without much overhead or using too many resources.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is the ECB encryption mode?

A

Encryption codebook.
The simplest encryption mode. (usually too simple for most usecases)
All blocks are encrypted with the same key, identical plaintext blocks will create identical ciphertext blocks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is the CBC encryption mode?

A

Cipher block chaining.
This is a popular mode of encryption, and is easy to implement.
Adds a bit of additional randomization to the final result, each block is encrypted differently because the ciphertext from a previous block will be used as the initialization vector(IV) for the following block.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is a CTR encryption mode?

A
A counter (CTR) encryption mode will use a counter while encrypting blocks of plaintext, each block will be encrypted differently.
The difference between them is caused by an encrypted version of the current counter value being added to the key used for that encryption.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is the GCM encryption mode?

A

Galois counter mode combines counter(CTR) mode with galois authentication.
You can combine both encryption and authentication.
This is used in SSH, TLS and more.
Commonly used in wireless connectivity, IPsec, wireless, etc

How well did you know this?
1
Not at all
2
3
4
5
Perfectly