Cryptography Flashcards

1
Q

Salting

A

A process where a computer adds a small amount of data to the end of a password before hashing.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Key Stretching

A

A technique used to slow the process of hashing.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

HSM

A

Hardware Security Modules - a device which stores, encrypts, and decrypts passwords. It is often plugged into a USB port, and keys cannot be exported in a usable format.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Key (Cryptography)

A

A binary value which determines the value of the ciphertext. For a key length of n, there are 2^n possible keys.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Key Chain

A

A file which contains cryptographic keys.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Session Key

A

A key generated at each exchange of data. They are deleted after a session.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Symmetric Encryption

A

A form of encryption which uses the same key to decrypt data, such as ROT13.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

DES

A

Data Encryption Standard - a program which splits plaintext into 64 bit blocks, each of which is then divided in half. One half is scrambled using an algorithm (F-function), before the halves are recombined, swapped, and the process repeated 16 times. Regular DES is no longer practically used due to increasing computing performance making decryption too easy.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

3DES

A

Triple Data Encryption Standard - a standard for encryption which repeats DES three times. It uses a key-bundle with 2 to 3 DES keys, giving it a key size of 112 or 168 bits.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

AES

A

Advanced Encryption Standard - a symmetric cipher with a key length of 128,192, or 256. It is used for purposes such as protecting hard disk data, voice call data, and password manager contents.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Private Key

A

A key used in asymmetric cryptography which is never seen by anyone other than the sender.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Public Key

A

A key used in asymmetric cryptography which can be seen by anyone.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Asymmetric Encryption

A

A form of encryption where each user has a public and private key. The private key can decrypt files encrypted with the paired public key and vice versa. Anyone sending data to Alice will use a copy of her public key, and only she can decrypt it using her private key.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Key Pair

A

The term for the combination of the public and private keys. Keys are typically quite large, at around 1024, 2048, or 4096 bits long.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Key Revocation

A

The act of a user marking a private key as no longer trusted, perhaps after forgetting it or losing it. This service is offered by public-key encryption software, and should involve users being updated as to the correct new public key.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Digital Signature

A

A small hash (based on the created email) encrypted using a senders private key. It is attached to the sent email so that the recipient can decrypt it using the senders public key. The received email can be used to generate a hash which should match this decrypted digital signature. Digital signatures can be faked along with a phony public key in a database.

17
Q

Digital Certificate

A

An item held by a trusted third party that authenticates public keys and digital signatures. Digital certificates typically contain a version number, unique serial number, data information, subject information, acceptable uses, and a hash of the certificate’s contents known as a thumbprint (or fingerprint).

18
Q

Thumbprint (Cryptography)

A

A piece of data held in a digital certificate that represents a hash of the certificate’s contents. If any of the contents are changed, the hash will no longer be correct, meaning problems can be checked for.

19
Q

Certificate Authority

A

A company that authenticates public key holders. This can be done using online records or a notary.