Cryptography Flashcards

1
Q

cryptography

A
  • kryptos meaning hidden
  • prefix “crypt” means hidden and suffix “graphy”
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

cryptography

A

protecting data by hiding it from anyone who isnt suppoed to see, access, or change it

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

broad umbrell aterm that encompasses both cryptography and cryptanalysis

A

cryptology

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

cyrptananlysis

A

figuring out how to access data without having necessary cryptographic key

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

applications of cryptography

A

secure communication, financial transactio, and protecting sensitive data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q
  • understanding of different types of cryptography such as symmetric, asymmetric
  • basic concepts of encryption, decryption, hashing, and digital signatures
A

fundamentals of cryptography

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

types of cryptography

A
  1. symmetric
  2. asymmetric
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

symmetric

A
  • uses single key for bothe encryption and decryption
  • muts be shared by all communicationg parties
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

asymmetric

A
  • allows users to encrypt information using shared keys
  • two keys’ encyrption and decryption
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

cryptosystem

A

structure consisting of a set of algorithms that converts plaintext to ciphertext to encode or decode messages securely

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

process by which a readable message is converted to unreadable form to prevent unauthorized parties from reading it

A

encryption

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

process of converting an encrypted message back to its original form

A

decryption

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

called as original message

A

plaintext

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

3 concepts of cryptosystem

A
  1. encyrption
  2. decryption
  3. plainytext
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

private key

A
  • is a symmetric key
  • use a single key for both encryption and decryption
  • must be shared to all parties which can be a challenge in some situatiions
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

public key

A

asymmteric key that allows users to encrypt information using shred keys

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

when should symmteric encryption be used

A

due to better perfomance and faster speed, it is typically used fro bulk encyrption of large amounts of data for database encryption

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

how does symmetric encryption work

A
  • message you want to encrypt plaintext)
  • symmetric key algorithms
  • shared key for you and your recipient that can encrypt and decrypt
  • encrypted message no one can read
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

method used by Caesar to secretly communicate with his generals

A

Caesar cipher

20
Q

is numbe of sequencer of steps that is used to convert plaintext information into ciphertext

A

cipher

21
Q

how does asymmetric encryption work

A
  • allows users to encrypt information using shared keys
  • if you want to send a message over the internet but also dont want anyone but the intentedd recipient to see what youve written
22
Q

is numbe of sequencer of steps that is used to convert plaintext information into ciphertext

A
23
Q

how does asymmetric cryptography works

A
  • algorithm starts process
  • mathematical function generates key pair
24
Q

asymmetric cryptography process

A
  1. registration
  2. lookup
  3. encrypt
  4. decode
  5. reply
25
Q

registration

A

sender have connected with official entity that generated both public and private keys

26
Q

lookup

A

sender scours a public-key directory for recipient public key information

27
Q

encrypt

A

sender creates message, encrypts it with recipient public key and sends it

28
Q

decode

A

recipient uses private key to unscramble message

29
Q

reply

A

if recipient wants to respond, process moves in reverse order

30
Q

pros of asymmetric encryption

A
  • security
  • transparency
  • appearance
31
Q
  • one-way mathematical functions that takes an input of any length and produced a fixed-size output
  • used to ensure data integrity and to verify the authenticity of digital signatures
A

hashing

32
Q

advanced encryption standard (AES)

A

algorithm that uses same key to encrypy and decrypt protected data

33
Q

Rivest, Shamir, Adleman
(RSA)

A
  • based on public-key encryption technilogy
  • public key cryptosystem for reliable data transmission
  • pirmarily used for secure key exchange and digital signature
34
Q

Message-Digest Algorithm 5
(MD5)

A
  • widely used cryptography hash function that results in 128-bit hash value
  • message digests represented by 32 bit hexadecimal numbers
35
Q

Security Hash Algorith
(SHA)

A
  • used for hashin data and certificate lies
  • every piece of data produces a uniqe hash that is thoroughly non-deplicable by any other piece of data
36
Q

Cryptographic Algorithms

A
  1. Advanced Encryption Security
  2. Rivest, Shadir, Adleman
  3. Message-Digest Algorithm 5
  4. Secure Hash Algorithm
37
Q

digital signature

A
  • electronic, encrypted, stamp of authentication on digital information such as email
  • confirms that the information origincated from signer and has not been altered
  • may also provide repudiation
  • looks like a digital footprint
  • secure documents, emails, files
38
Q

electronic signature

A
  • confirms intent of signing a document
  • no identity validation
  • vulnerable to tampering and man-in-the-middle attacks
  • no encryption
  • looks like an electronic copy of handwritten signature
  • document verification
39
Q

how digital signatures work

A
  • use cryptography to creat eunique digital fingerprints for document verification and secure online transaction
  • signer’s identity is verified by trusted third party, Certificate Authority)
40
Q

secure cryptographic process allows digital signatures to assure

A
  1. authentication of document
  2. verification of signer’s identity by trusted service provider
  3. no tampering or forgery occurred after document was digitally signed
41
Q

signer is confirmed as the signer

A

authenticity

42
Q

the content has not been changed or tampered with since it was digitally signed

A

integrity

43
Q

proves all parties the origin of the signed content

A

non-repudiation

44
Q
  • signatures in microsoft word are time stamped by secure time-stamp server under certain circumstances have the validity
A

notarization

45
Q
A