Cryptography Flashcards

1
Q

What is plaintext

A

unencrypted data, often text but good be other files such as an image.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is encoding

A

A form of data representation such as base64, immediately reversable.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is a brute force attack

A

attacking cryptography by trying every different password or every different key

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is crypttanalysis

A

attacking cryptography by finding a weakness in the underlying mathematics

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

what is a hash function

A

a mathematical function that converts any digital data into an output string with a fixed number of characters. Meant to be irreversible

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is a hash collision

A

2 different has inputs give the same output

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

what hash algorithm has the prefix $1$

A

md5crypt

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

what hash algorithm has the following prefixes $2$, $2a$, $2b$, $2x$, $2y$

A

Bcrypt

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

what has algorithm has the prefix $6$

A

sha512crypt

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is John The Ripper

A

hash cracking tool

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is hash-identifier

A

A python tool that helps identify types of hashes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

what is NTHash

A

hash format used in modern Window OS machines to store user and service passwords

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is John’s unshadow used for

A

used to allow John to crack /etc/shadow hashes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

what is used to allow John to crack zip files

A

Zip2John

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is used to allow John to crack SSH Key Passwords

A

ssh2john

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

what is ciphertext

A

the result of encrypting a plantext

17
Q

what is a cipher

A

a method of encrypting or decrypting data

18
Q

what is encryption

A

transforming data into ciphertext using a cipher

19
Q

what is asymmetric encryption

A

uses different keys to encrypt and decrypt

20
Q

what is symmetric encryption

A

uses the same key to encrypt and decrypt