Cryptography Flashcards

1
Q

What is the standard required for handling credit card information?

A

PCI DSS (Payment Card Industry Data Security Standard)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What do you call the encrypted plaintext?

A

Ciphertext

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What do you call the process that returns the plaintext?

A

Decryption

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

RSA math: n is what?

A

the product of p and q (p * q)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

RSA Math: p and q?

A

Large primenumbers (300 digits)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

RSA math: Public key is?

A

n and e (n,e)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

RSA math: Private key is?

A

n and d (n,d)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

RSA math: Representation of plaintext message?

A

m

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

RSA math: Representation of the encrypted messsage?

A

c

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

RSA math: ϕ(n) = ?

A

n - p - q + 1

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

[Forklar] Diffie-Helman Key Exchange

A

Person A og B har adgang til et fællesmateriale (p og g, hvorom der gælder: p skal være et primtal, og der skal gælde at 0 < g < p)
Person A og B vælger hver deres secret key (a & b), som skal være en integer.
A = g^a mod p
B = g^b mod p
Person A sender A
Person B sender B
Key eller secret kan nu kommes frem til:
key = B^a mod p
key = A^b mod p

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Diffie-Helman math: Formel for the secret key?

A

A^b mod p = secret

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

[Forklar] Hvad er cryptography?

A

It is the science of securing communication and data using codes and ciphers.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

[Forklar] Hvad er cryptanalysis

A

It is the study of methods to break or bypass cryptographic security systems without knowing the key.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

[Forklar] Hvad er Brute-Force Attack

A

It is an attack method that involves trying every possible key or password to decrypt a message

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

[Forklar] Dictionary Attack

A

It is an attack method where the attacker tries dictionary words or combinations of them

17
Q

[ABB] Hvad står SHA for?

A

Secure Hashing Algorithm

18
Q

[ABB] Hvad står MD-5 for?

A

Message-Digest Algorithm 5

19
Q

[CMD] How do you show NUMBER LINE in a text file?

A

sed -n ‘NUMBERp’ <file.txt></file.txt>

20
Q

[CMD] Anvend Hashcat på et hash som er $2a$06$7yoU3Ng8dHTXphAg913cyO6Bjs3K5lBnwq5FJyA6d01pMSrddr1ZG
og crack den.

A

Hashcat.net -> 2a (bcrypt -> hash code 3200)
hashcat -m 3200 -a 0 hashfile wordlist

21
Q

[Eksemplificer!] Kom med eksempler på to hjemmesider man kan bruge til at cracke hashes med

A

Crackstation.com & hashes.com

22
Q

[Tools] Nævn nogle tools indenfor cracking!

A

HASHCAT og HASHid