Cryptography Flashcards

1
Q

_ is the process of communicating confidential information In an unreadable format between legitimate users

A

Cryptography

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Cryptography intercepts _ types of data’s accessibility

A

Unauthorised

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is the meaning of crypt?

A

Hidden and writing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What are applications of cryptography?

A

Digital signature

Authentication

Key generation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What principles of cryptography explains that transmitted data in air must be read by the authentic user

A

Privacy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Serves as a gateaway between a trusted and untrusted network that limited, authorised to untrusted hosts

A

Bastion hosts

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

A basic network mapping technique that helps narrow the scope all attack

A

Bridges

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Layering model structured into four layers

A

TCP/IP or department of defense model

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Provides connection - oriented data management and reliable data transfer

A

Transmission Control Protocol TCP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Provides a lightweight service for connectionless data transfer without error detection and correction

A

User datagram protocol UDP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

A virtual private network (VPN) is an entrusted network tunnel two that allows to securely communicate over an untrusted network

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

The OSI model is broken into seven layers - name them

A

Application layer
Presentation layer
Session layer
Transport layer
Network layer
Data link layer
Physical layer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Firewalls as devices that enforce administrative security policies filtering incoming traffic based on a set of rules

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Fibre channel over Ethernet (FCoE) is a statefull protocol that requires two communication channels

A

False

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Transmission control protocol (TCP) provides connection-oriented data management and reliable data transfer

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Hardware or software implementation of cryptography that transforms a message into ciphertext and back to plaintext

A

Cryptosystem

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Instance of 2 different keys generating the same ciphertext from same plaintext

A

Key clustering

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

A range of possible values used to construct keys

A

Keyspace

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Estimated time, effort or resources necessary to break a cryptosystem

A

Work factor

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Hiding data in another media type so the existence is concealed. Usually hiding messages in images

A

Steganography

21
Q

What is Symmetric Cryptography

A

Sender/Receiver use the same key for encryption and decryption

Also called secret keys because each user has to keep the key secret

22
Q

Examples of symmetric cryptography?

A

DES
Triple DES (3DES)
Blowfish
IDEA
RC4, RC5, RC6
AES

23
Q

What is Asymmetric Cryptography?

A

Public key

2 different keys are mathematically related

One public and one private

24
Q

Examples of Asymmetric Cryptography?

A

RSA
ECC
Diffie-Hellman
El Gamel
DSA

25
Q

What security service does Asymmetric Crptography provide?

A

Authentication and nonrepudiation

26
Q

What security service does Symmetric Cryptography provide?

A

Confidentiality

27
Q

What is a block cipher?

A

A message divided into blocks of bits that are pug through mathematical functions one block at a t8me

If it is a 64 bit block cipher, the message is broken up into blocks of 64 bits

28
Q

What are stream ciphers?

A

Doesn’t break messages up into blocks.

Treats message as a stream of bits
Performs mathematical functions on each bits

29
Q

What is a hybrid encryption method?

A

Symmetric algorithm creates keys used for encrypting bulk data

Asymmetric algorithm creates keys for automated key distribution

30
Q

Describe DES

A

Key type: Symmetric
Cypher type: Block
Block size: 64
Key length: 56

31
Q

Describe 3DES

A

Key type: Symmetric
Cipher type: Block
Block size: 192
Key length:168

32
Q

Describe AES

A

Key type: Symmetric
Cipher type: Rijindael block
Block size: 128
Key length:128, 192, 256

33
Q

Describe IDEA

A

Key type: Symmetric
Cipher type: Block
Block size: 64
Key length: 128

34
Q

What is the Caesar cipher?

A

Substitution cipher

Shift each letter of the alphabet and shift by 3 characters

35
Q

What is the Vernam Cipher?

A

One time pad
Modulo 26 - wrap around the alphabet

36
Q

Describe RSA

A

Key type: Asymmetric
Use: key transport, digital sigs, encryption
Strength: strong
Used in: smime

37
Q

Describe Diffie Hellman

A

Key type: Asymmetric
Use: exchange (agreement)
Strength: moderate
Used in: SSL handshake

38
Q

Describe ElGamal

A

Key type: Asymmetric
Use: key exchange, digital signatures, encryption
Strength: very strong
Used in: PKI

39
Q

What is MAC? Message authentication code

A

Shortpiece of info used to authenticate a message

Encrypt hash value

40
Q

What is MD2?

A

One way hashing algorithm

Produces a 128 bit hash value

Much slower than MD4 & MD5

41
Q

What is Message Digest 4 (MD4)?

A

One way hashing algorithm

Produces a 128 bit hash value

42
Q

What is Message Digest 5 (MD5)? ‘

A

One way hashing algorithm.

Produces 128 bit hash value.

More complex than MD4

43
Q

What is HAVAL?

A

One way hash algorithm.

Variable length hash value.

Modification of MD5 that provides more protection against MD5 vulnerabilities

44
Q

What is SHA?

A

One way hash algorithm.

Produces 160 bit hash value.

Used with DSA

45
Q

Describe digital signatures

A

Hash value that has been encrypted with sender’s private key
Hashing ensures integrity
Signing provides authentication and nonrepudiation

46
Q

What security service does encryption provide?

A

Confidentiality

47
Q

What security service does hashing provide?

A

Integrity

48
Q

What security services does digital signatures provide?

A

Authentication
Non repudiation
Integrity

49
Q

Describe Public Key Infrastructure PKI

A

Enables a level of trust with in an environment

Authentication
confidentiality
nonrepudiation
integrity

Hybrid of symmetric and asymmetric key algorithms