Cryptography Flashcards

1
Q

What does the private key of an account act as?

A

The private key of an account acts as the password for that account.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What can a person do if they have access to the private key of an account?

A
  1. Send/sign transactions
  2. Access the funds associated with that account
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Should private keys be shared online or with other people?

A

No, private keys should never be shared online or with other people.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Where should private keys be stored?

A
  1. Private keys should be stored in a secure location
  2. Private keys should be stored in multiple secure locations
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Can you retrieve your funds if your private key is lost or stolen?

A
  1. No, if your private key is lost or stolen, you cannot retrieve your funds as the private key acts as the password to your account.
  2. The public key is also needed
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Can you change your private key if it is compromised?

A

No, you cannot change your private key. If it is compromised, you would have to move your funds to a new account with a new private key.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is a public key in the context of a blockchain account?

A
  1. A blockchain account’s public key acts as the identifier for an account.
  2. Public keys and addresses are derived from private keys using algorithms like elliptic curve multiplication or RSA
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What role do nodes on a network play in relation to a public key?

A

Nodes on a network can validate transactions that were signed properly using an account’s public key.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Is it safe to share your public key?

A

Yes, it is safe to share your public key.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

How is a public key derived?

A

A public key is derived from a private key.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

How is a public key different from an address?

A
  1. A public key is a longer form of an address.
  2. Less convenient form of an address.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

An Ethereum address is how many bytes?

A

20 bytes (160 bits or 40 hex characters)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

How is a address different from an public key?

A
  1. A address is a shorter and
  2. More convenient form of an address
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What are hash functions in the context of internet security and cryptography?

A
  1. Hash functions are “one-way” functions that have no known inverse.
  2. They are the foundation of modern internet security and cryptography.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

How is the speed of computing hash functions?

A

Hash functions are fast to compute.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is a hash function digest?

A

Hash functions generate a uniform output, also known as a digest.

17
Q

What does it mean when we say hash functions are deterministic?

A

Hash functions are deterministic, which means given the same input, they will always produce the same output.

18
Q

What is a hash collision and how common is it?

A

A hash collision occurs when two different inputs produce the same output hash. However, this is very rare with good hash functions.

19
Q

List the properties of a hash function?

A
  1. Fast to compute.
  2. Generate a uniform output (a.k.a digest, e.g. same length).
  3. No known inverse.
  4. Deterministic.
  5. Very rare hash collisions.
20
Q

What size is a size is a private key?

A

64-digit hexadecimal strings (valid characters are 0 - 9 and a - f)

21
Q

What are private keys encrypted with?

A

Private keys are typically encrypted with a password.