Cryptography Flashcards

1
Q

the practice of disguising information in a way that looks random

A

Cryptography

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

earliest known and simplest cypher; uses substitution and a decoder ring

A

Caesar Cipher

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

breaking encrypted codes

A

Cryptanalysis

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

employees the Caesar cipher as one element of the encryption process; requires a key

A

Vingenere Cipher

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Classic cryptography components (two)

A

Algorithm and key for encryption

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

encoded and decoded with the same key; The primary way that we encrypt data

A

symmetric encryption

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

sending key with encrypted data

A

in-band

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

sending key without encrypted data

A

out-of-band

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

uses a key pair (public and private)

A

Asymmetric encryption

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

defines key properties, communication requirements for the key exchange and the actions taken through encryption and decryption process

A

Cryptosystem

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Which algorithm is a block cipher, has 64-bit block size, 16 rounds, and a key size of 56 bits?

A

Data Encryption Standard (DES)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Which algorithm has a 64-bit block size and a key size of 32-448 bits?

A

Blowfish

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Which algorithm has a 64-bit block size and a 168 bit key size?

A

Triple DES

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Which algorithm is the U.S. government encryption standard supported by the NIST and has a 128-bit block size and a key size of 128,192,or 256 bits?

A

Advanced Encryption Standard (AES)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What type of algorithm encrypts one bit at a time?

A

Streaming cipher

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

a fixed size input to a cryptographic primitive that is typically required to be random or pseudorandom

A

Initialization vector

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

outputs true only when inputs differ (one is true, zero is false)

A

Exclusive OR (XOR)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

each block of plaintext is XORed with the previous cipher text block before being encrypted; each cipher text block depends on all plaintext blocks processed up to that point. To make each message unique, an initialization vector

A

Cipher Block Chaining (CRB)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

makes a block cipher into self-synchronizing stream cipher. almost identical to CBC performed in reverse

A

Cipher Feedback (CFB)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

makes a block cipher into a synchronous stream cipher; generates keystream blocks, which are XORed with the plaintext blocks to get the cipher text

A

Output Feedback

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

generates the next keystream block by encrypting successive values of a “counter.” The counter can be any function which produces a sequence which is guaranteed not to repeat for a long time, although an actual increment-by-one counter is simplest and most popular.

A

Counter (CTR)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

The message is divided into blocks, and each block encrypted separately.

A

Electronic Codebook (ECB)

23
Q

plain text converted into 16-bit, 64-bit, or 128-bit binary cipher text

A

binary block

24
Q

o Asymmetric cryptographic algorithm
o Based on the fact that finding the factors of a large composite number is difficult: when integers are prime numbers, the problem is called prime factorization

A

RSA Alogrithm

25
Q

An approach to public-key cryptography based on the algebraic structure of elliptic curves over finite fields

A

Elliptic Curve Cryptography (ECC)

26
Q

o Doesn’t provide encryption, provides a methodology for two parties to come up with the same key
o Key agreement (or exchange) protocol
o Groups help by defining the size or the structure of the key to use
o Can have very large keys

A

Diffie Hellman

27
Q

Encrypts a message with the public key; the message is decrypted with the private key

A

Pretty Good Privacy (PGP)

28
Q

Decentralized trust model that Establishes the authenticity between a public key and its owner

A

web of trust

29
Q

o Provides integrity when it comes to the CIA of security

o Does not encrypt data but it gives it integrity

A

Hashing

30
Q

128 bit hash invented by Ron Rivest in 1992

A

Message Digest 5 (MD5)

31
Q

Hash developed by NIS. Has a 160 bit hash, 256 bit hash, 512 bit hash version

A

Secure Hash Algorithm (SHA)

32
Q

hash algorithm with 128, 160, 256, 320 bit digests

A

RIPEMD (RACE Integrity Primitives Evaluation Message Digest)

33
Q

occurs when two distinct pieces of data have the same hash value, checksum, fingerprint, or cryptographic digest

A

Collision

34
Q

Specific type of message authentication code (MAC) involving a cryptographic hash function and a secret cryptographic key

A

HMAC (hash-based message authentication code)

35
Q

the process of taking data and hiding it in other data

A

Steganography

36
Q

At minimum, what does a digital certificate contain?

A

public key, digital signature

37
Q

What can you add to a digital certificate to make it more secure?

A

A third party digital signature

38
Q

What is a digital certificate that ONLY contains a public key and digital signature called?

A

Unsigned certificate

39
Q

Hierarchal structure with root servers at the top

A

Public Key Infrastructure (PKI)

40
Q

What is the structure of a PKI?

A

Certificate Authority (CA) – Intermediate Certificate Authority – users requesting certificates

41
Q

Distributes certificates to intermediate certificate authorities

A

Root Certificate Systems

42
Q

A group of public-key cryptography standards devised and published by RSA Security LLC.

A

PKCS (Public Key Cryptography Standards)

43
Q

Standard defining the format of public key certificates

A

X.509

44
Q

A way to store certificates in individual files

A

PKCS-7

45
Q

Stores the certificates and the private keys as a package

A

PKCS-12

46
Q

A list of digital certificates that have been revoked by the issuing certificate authority (CA) before their scheduled expiration date and should no longer by trusted

A

Certification Revocation list (CRL)

47
Q

An internet protocol used for obtaining the revocation status of an X.509 digital certificate

A

Online certificate status protocol (OCSP)

48
Q

Uses a text file full of dictionary words to performing a password (hash) attack

A

dictionary attack

49
Q

A precomputed table for reversing cryptographic hash functions, usually for cracking passwords

A

rainbow table attack

50
Q

Used to make a possibly weak key, typically a password or passphrase, more secure against a brute-force attack by increasing the resources (time and possibly space) it takes to test each possible key

A

keystretching technique (PKBDF2)

51
Q

Which part of the cryptography method is publicly available information?

A

the algorithm

52
Q

What are the two different types of cryptographic methods used for encryption?

A

symmetric and asymmetric

53
Q

PGP has been used by what service?

A

mail encryption