Cryptography Flashcards

1
Q

cryptography

A
  • kryptos meaning hidden
  • prefix “crypt” means hidden and suffix “graphy”
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

cryptography

A

protecting data by hiding it from anyone who isnt suppoed to see, access, or change it

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

broad umbrell aterm that encompasses both cryptography and cryptanalysis

A

cryptology

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

cyrptananlysis

A

figuring out how to access data without having necessary cryptographic key

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

applications of cryptography

A

secure communication, financial transactio, and protecting sensitive data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q
  • understanding of different types of cryptography such as symmetric, asymmetric
  • basic concepts of encryption, decryption, hashing, and digital signatures
A

fundamentals of cryptography

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

types of cryptography

A
  1. symmetric
  2. asymmetric
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

symmetric

A
  • uses single key for bothe encryption and decryption
  • muts be shared by all communicationg parties
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

asymmetric

A
  • allows users to encrypt information using shared keys
  • two keys’ encyrption and decryption
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

cryptosystem

A

structure consisting of a set of algorithms that converts plaintext to ciphertext to encode or decode messages securely

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

process by which a readable message is converted to unreadable form to prevent unauthorized parties from reading it

A

encryption

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

process of converting an encrypted message back to its original form

A

decryption

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

called as original message

A

plaintext

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

3 concepts of cryptosystem

A
  1. encyrption
  2. decryption
  3. plainytext
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

private key

A
  • is a symmetric key
  • use a single key for both encryption and decryption
  • must be shared to all parties which can be a challenge in some situatiions
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

public key

A

asymmteric key that allows users to encrypt information using shred keys

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

when should symmteric encryption be used

A

due to better perfomance and faster speed, it is typically used fro bulk encyrption of large amounts of data for database encryption

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

how does symmetric encryption work

A
  • message you want to encrypt plaintext)
  • symmetric key algorithms
  • shared key for you and your recipient that can encrypt and decrypt
  • encrypted message no one can read
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

method used by Caesar to secretly communicate with his generals

A

Caesar cipher

20
Q

is numbe of sequencer of steps that is used to convert plaintext information into ciphertext

21
Q

how does asymmetric encryption work

A
  • allows users to encrypt information using shared keys
  • if you want to send a message over the internet but also dont want anyone but the intentedd recipient to see what youve written
22
Q

is numbe of sequencer of steps that is used to convert plaintext information into ciphertext

23
Q

how does asymmetric cryptography works

A
  • algorithm starts process
  • mathematical function generates key pair
24
Q

asymmetric cryptography process

A
  1. registration
  2. lookup
  3. encrypt
  4. decode
  5. reply
25
registration
sender have connected with official entity that generated both public and private keys
26
lookup
sender scours a public-key directory for recipient public key information
27
encrypt
sender creates message, encrypts it with recipient public key and sends it
28
decode
recipient uses private key to unscramble message
29
reply
if recipient wants to respond, process moves in reverse order
30
pros of asymmetric encryption
* security * transparency * appearance
31
* one-way mathematical functions that takes an input of any length and produced a fixed-size output * used to ensure data integrity and to verify the authenticity of digital signatures
hashing
32
advanced encryption standard (AES)
algorithm that uses same key to encrypy and decrypt protected data
33
Rivest, Shamir, Adleman (RSA)
* based on public-key encryption technilogy * public key cryptosystem for reliable data transmission * pirmarily used for secure key exchange and digital signature
34
Message-Digest Algorithm 5 (MD5)
* widely used cryptography hash function that results in 128-bit hash value * **message digests** represented by 32 bit hexadecimal numbers
35
Security Hash Algorith (SHA)
* used for hashin data and certificate lies * every piece of data produces a uniqe hash that is thoroughly non-deplicable by any other piece of data
36
Cryptographic Algorithms
1. Advanced Encryption Security 2. Rivest, Shadir, Adleman 3. Message-Digest Algorithm 5 4. Secure Hash Algorithm
37
digital signature
* electronic, encrypted, stamp of authentication on digital information such as email * confirms that the information origincated from signer and has not been altered * may also provide repudiation * looks like a digital footprint * secure documents, emails, files
38
electronic signature
* confirms intent of signing a document * no identity validation * vulnerable to tampering and man-in-the-middle attacks * no encryption * looks like an electronic copy of handwritten signature * document verification
39
how digital signatures work
* use cryptography to creat eunique digital fingerprints for document verification and secure online transaction * signer's identity is verified by trusted third party, Certificate Authority)
40
secure cryptographic process allows digital signatures to assure
1. authentication of document 2. verification of signer's identity by trusted service provider 3. no tampering or forgery occurred after document was digitally signed
41
signer is confirmed as the signer
authenticity
42
the content has not been changed or tampered with since it was digitally signed
integrity
43
proves all parties the origin of the signed content
non-repudiation
44
* signatures in microsoft word are time stamped by secure time-stamp server under certain circumstances have the validity
notarization
45