Cryptography Flashcards

1
Q

What is the difference between symmetric and asymmetric encryption?

A

Symmetric involves the sharing of an encrypted message and a single private key, which is used to decrypt all messages in that stream.

Asymmetric instead uses a public and a private key. A sender uses the recipient’s public key to encrypt the message, then sends it along the stream. The recipient can then use their own private key to decrypt the message.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Kerchoff’s Law

A

A cipher must not rely on the secrecy of said cipher.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Sufficient Key-Space Principle

A

Any security scheme must have a key space that is large enough to not be reliably brute-forced.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Moore’s Law

A

The number of transistors on a microchip doubles each year.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What are the three methods to ‘break’ cryptography?

A

Brute force
Trying every possible combination to crack the cipher.

Differential cryptanalysis
Decrypting small parts and seeing if it makes sense.

Side-channel attack
Using external data like speed and temperature to piece together the password.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is Zimmermann’s Law?

A

“The ability of computers to track us doubles every eighteen months.”

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Who can see your message if you’re using HTTP?

A

Everyone who intercepts your transmission can see your message.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Who can see your message if you’re using HTTPS?

A

Only the recipient (the web server) can see your message.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Who can see your message if you’re using HTTPS + TOR?

A

Nobody can see your message until it has passed through the TOR relays, which hide your location.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is Heartbleed?

A

A method to get more data than intended by requesting a content length greater than intended.

e.g. “Send this 500-letter word “bird” if you are there”; Server sends “bird” followed by the next 496 characters in memory

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is DROWN?

A

An exploit used against SSLv2-enabled servers, which allows the attacker to obtain secure private keys.

A server is vulnerable if it allows both TLS and SSLv2 connections or if it shares a public key with a server allowing SSLv2 connections.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is a digital signature?

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

How is a digital signature generated?

A

A digital signature is generated using a combination of a private key and a message or document. The process typically involves the following steps:

  1. The sender generates a hash of the message or document they want to sign. A hash is a unique representation of the content, and it ensures that the document has not been altered during transmission.
  2. The sender encrypts the hash using their private key. This creates a digital signature that can only be decrypted using the sender’s public key.
  3. The sender sends the message or document and the digital signature to the recipient.
  4. The recipient uses the sender’s public key to decrypt the digital signature and verify that it matches the hash of the received message or document. This ensures that the message or document was not altered in transit and that it was indeed sent by the owner of the private key.
  5. If the digital signature is valid, the recipient can trust that the message or document is authentic and has not been tampered with.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is a hash?

A

A hash is a string of characters that is the result of running an input through a hash function.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is a hash function?

A

A hash function is a mathematical algorithm which takes an input and returns a fixed-size string of characters, called the hash. The input can be of any size, but the output (or hash value) is always the same size.

One of the main characteristics of a hash function is that it is a one-way function, which means that it is easy to compute the hash value of an input, but it is very difficult to recreate the input from the hash value, making it ideal for storing passwords or other sensitive data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

How can you use a hash to verify that a message has not been tampered with?

A

We do this using what is called a digital signature.

First, we create a hash from the message using a hash function. Then, we take this hash and encrypt it using our own private key. This is our “digital signature”.

The encrypted message + hash is then sent along with the digital signature we generated previously. When the full message has been sent, the recipient uses our public key to decrypt the digital signature. If it matches the hash, we can be sure that the original message was not tampered with.

16
Q

How can you use a hash to verify that a message has not been tampered with?

A

We do this using what is called a digital signature.

First, we create a hash from the message using a hash function. Then, we take this hash and encrypt it using our own private key. This is our “digital signature”.

The encrypted message + hash is then sent along with the digital signature we generated previously. When the full message has been sent, the recipient uses our public key to decrypt the digital signature. If it matches the hash, we can be sure that the original message was not tampered with.