Cryptography Flashcards

1
Q

The practice and study of writing and solving codes in order to hide the
true meaning of information

A

Cryptography

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Process of converting ordinary information (plaintext) into an
unintelligible form (ciphertext)

A

Encryption

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Inactive data that is archived, such as data resident
on a hard disk drive

A

Data at Rest

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Data crossing the network or data that resides in a
computer’s memory

A

Data in Transit

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Data that is undergoing constant change

A

Data in Use

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

The essential piece of information that determines
the output of a cipher

A

Key

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Encryption algorithm in which both the sender and the receiver must
know the same secret using a privately-held key

A

Symmetric Algorithm (Private Key)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

DES, 3DES, IDEA, AES, Blowfish, Twofish, RC4, RC5, RC6

A

Symmetric Algorithm

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Encryption algorithm where different keys are used to encrypt and
decrypt the data

A

Asymmetric Encryption (Public Key)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Utilizes asymmetric encryption to securely transfer a private key that can
then be used with symmetric encryption

A

Hybrid Implementation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Utilizes a keystream generator to encrypt data bit by bit using a
mathematical XOR function to create the ciphertext

A

Stream Cipher

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Breaks the input into fixed-length blocks of data and performs the
encryption on each block

A

Block Cipher

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Encryption algorithm which breaks the input into 64-bit blocks and uses
transposition and substitution to create ciphertext using an effective key
strength of only 56-bits

A

Data Encryption Standard (DES)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Encryption algorithm which uses three separate symmetric keys to
encrypt, decrypt, then encrypt the plaintext into ciphertext in order to
increase the strength of DES

A

Triple DES(3DES)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Symmetric block cipher which uses 64-bit blocks to encrypt plaintext into
ciphertext

A

International Data Encryption Algorithm (IDEA)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Symmetric block cipher that uses 128-bit, 192-bit, or 256-bit blocks and a
matching encryption key size to encrypt plaintext into ciphertext

A

Advanced Encryption Standard (AES)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Symmetric block cipher that uses 64-bit blocks and a variable length
encryption key to encrypt plaintext into ciphertext

18
Q

Symmetric block cipher that replaced blowfish and uses 128-bit blocks
and a 128-bit, 192-bit, or 256-bit encryption key to encrypt plaintext into
ciphertext

19
Q

Symmetric stream cipher using a variable key size from 40-bits to 2048-
bits that is used in SSL and WEP

A

Rivest Cipher (RC4)

20
Q

Symmetric block cipher with a key size up to 2048-bits

A

Rivest Cipher (RC5)

21
Q

Symmetric block cipher that was introduced as a replacement for DES but
AES was chosen instead

A

River Cipher (RC6)

22
Q

A hash digest of a message encrypted with the sender’s private key to let
the recipient know the document was created and sent by the person
claiming to have sent it

A

Digital Signature

23
Q

Diffie-Hellman, RSA, and ECC

A

Asymmetric Algorithm ( private key)

24
Q

Used to conduct key exchanges and secure key distribution over an
unsecured network

A

Diffie Hellman (DH)

25
Asymmetric algorithm that relies on the mathematical difficulty of factoring large prime numbers ____ is widely used for key exchange, encryption, and digital signatures ____ can use key sizes of 1024-bits to 4096-bits
RSA( Rivest, Shamir, and Adleman)
26
Algorithm that is based upon the algebraic structure of elliptic curves over finite fields to define the keys § _____ with a 256-bit key is just as secure as RSA with a 2048-bit key
Elliptic Curve Cryptography (ECC)
27
An encryption program used for signing, encrypting, and decrypting emails
Pretty Good Privacy (PGP)
28
A newer and updated version of the PGP encryption suite that uses AES for its symmetric encryption functions
GNU Privacy Guard (GPG)
29
Refers to how an organization will generate, exchange, store, and use encryption keys
Key Management
30
A stream cipher that encrypts plaintext information with a secret random key that is the same length as the plaintext input
One-Time Pad
31
A simulated random number stream generated by a computer that is used in cryptography, video games, and more
Pseudo-Random Number Generator (PRNG)
32
The science and art of hiding messages within other messages
Steganography
33
A shared, immutable ledger for recording transactions, tracking assets and building trust
Blockchain
34
A record-keeping system that maintains participants’ identities in secure and anonymous form, their respective cryptocurrency balances, and a record book of all the genuine transactions executed between network participants
Public Ledger
35
A computer that uses quantum mechanics to generate and manipulate quantum bits (qubits) in order to access enormous processing powers
Quantum Computing
36
A communications network that relies on qubits made of photons (light) to send multiple combinations of 1s and 0s simultaneously which results in tamper resistant and extremely fast communications
Quantum Communication
37
A quantum bit composed of electrons or photons that can represent numerous combinations of 1s and 0s at the same time through superposition
Qubit
38
A new kind of cryptographic algorithm that can be implemented using today’s classical computers but is also impervious to attacks from future quantum computers
Post-quantum Cryptography
39
A cryptographic key that is generated for each execution of a key establishment process
Ephemeral
40
An encryption method that allows calculations to be performed on data without decrypting it first
Homomorphic Encryption