Cryptography Flashcards

1
Q

Making something less visible or obvious

ex:making a picture blurry

A

Diffusion

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

CRL

A

Certification Revocation List

-Being replaced by OCSP because of speed

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

DES - first type of block encryption

A

Data Encryption Standard

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Taking one value and changing it for another

ex:making all A’s into C’s

A

Subsitution

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Data at rest

A

Something stored and not being used - something sitting on a hard drive or flash drive

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Cryptanalysis

A

Breaking encrypted codes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Type of key that can only encrypt

A

Public Key

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Unlike block ciphers, this one works by encrypting one bit at a time as it passes through

A

Streaming Ciphers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Cipher that works like a decoder ring

A

Ceaser Cipher

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Which is older?

MD5 or SHA-1

A

MD5

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Shared key for a set of data

A

Session Key

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Type of key that can decrpt

A

Private Key

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Ripemd

Bit #

A

Not very common Hash

128, 160, 256, 320 bit hash

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

HMAC

A

Hash-based message authentication code

  • requires each side of the conversation to have the same key
  • provides message integrity
  • based on standard hashes
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

ECB

A

Electronic Code Book

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

GCM

  • block encryption with authentication
  • commonly used in packetized data
A

Galois Counter Mode

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Encryption/Decryption

A

Hiding data and then bringing it back

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

AES

A

Advanced Encryption System

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

EDH or DHE

A

Ephemeral Diffie Hellman

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Type of encryption used for WPA2

A

AES

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

In-band

A

Key is sent with encrypted data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

Mixing something up

ex:moving pixels around in a picture

A

Confusion

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

PKCS-7

A

Is a way to store certificates as individual files

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

Key Stretching

A

Stretches out the password/hash

ex: bcrypt

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

Digital Signature

A

Just a hash of whatever data you’re looking at

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

Attack using a pre-generated index hash table for harder passwords/hashes than brute force can handle

A

Rainbow Table Attack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

What are the 4 types of Symmetric Block Modes

A

Cipher Block Chaining (CBC)
Cipher Feedback (CFB)
Output Feedback (OFB)
Counter (CTR)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

Type of Streaming Cipher

A

RC4

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

MD5

Bit #

A

Message Digest 5

128 bit

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q

RSA Cryptosystems

A

Asymmetric Algorithm

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
31
Q

TLS

-provides transport encryption

A

Transport Layer Security

32
Q

Temporary key so it can’t be used in future sessions

-provides “perfect forward secrecy”

A

Ephemeral Key

33
Q

PGP

A

Pretty Good Privacy

Asymmetric encryption originally used for email

34
Q

Cipher that uses a grid setup like a ceaser cipher but uses a key that’s applied instead of ROT telling you how far to turn

A

Vigenere Cipher

35
Q

ECDHE

A

Elliptic Curve Diffie Hellman Ephermeral

36
Q

Encrypts data in small chucks until finished

A

Block Encryption

37
Q

Block cipher
64-bit block size
16 rounds
Key size: 32-448 bits

A

Blowfish

38
Q

Data in transit

A

Data that is being transferred like over the internet

39
Q

Streaming cipher
1 bit at a time
1 rounds
Key size: 40 - 2048 bit

A

RC4

40
Q

What is Cain and Abel

A

A password/hash cracking program

41
Q

Salt

A

Adding characters to a password before hashing to make password very hard to crack

42
Q
  • Block modes will always generate same results with same input
  • Can generate patterns that give away data
  • No one uses this anymore
A

ECB - Electronic Code Book

43
Q

Symmetric Block Mode

-Uses Initialization Vector to XOR to encrypt

A

CBC - Cipher Block Chaining

44
Q

Symmetric Block Modes use this to ensure the output block is uniquely different?

A

IV - Initialization Vectors

45
Q

Encryption style that uses the same key to encrypt and decrypt

A

Symmetric encryption

46
Q

Out-of-band

A

Delivering the key separately from data

47
Q

SHA 1 and 2

Bit #

A
Secure Hash Algorithm
SHA-1 
160 bit
SHA-2
256bit and 512bit
48
Q

Block cipher
64-bit block size
16 rounds
Key size: 56 bit

A

DES - Data Encryption Standard

49
Q

PKI

A
Public Key Infrastructure
Is a hierarchy
Certificate Authorities at top
Intermediate Authorities 
Then Users at the bottom
50
Q

What kind of encryption do computers use?

A

Binary Encryption

51
Q

IPsec

A

Internet Protocol Security

52
Q

Digital Certificate

A

Includes public key/digital signature/3rd party digital signature
This is what a website will send you so you know they are legit

53
Q

Type of encryption used for WPA

A

RC4

54
Q

Block cipher
128-bit block size
10, 12, or 14 rounds
Key size: 128, 192, or 256 bit

A

AES - Advanced Encryption System

55
Q

Data in process

A

Data that is being used and is on memory(ram) or the CPU

56
Q

Diffie-Hellman

A

Asymmetric algorithm

Key exchange protocol

57
Q

Symmetric Block Mode

-Uses Initialization Vector to encrypt to XOR to replace IV with output

A

CFB - Cipher Feedback

58
Q

Symmetric block encryption

Still used by Gov’t

A

AES - Advanced Encryption System

59
Q

PFS

-all browsers now-a-days have to support this

A

Perfect Forward Secrecy

60
Q

OCSP

A

Online Certificate Status Protocol

-Is a more modern version of Certification Revocation List (CRL)

61
Q

Steganography

A
  • Hides data within data
  • Commonly used with graphic images
  • Hidden data may or may not be encrypted
62
Q

Types of Hashes

A

MD5
SHA
SHA-2 (Most common)
Ripemd (not very common)

63
Q

Hashes

A
  • Create a small value from any amount of data

- Will produce the same results each time the source is hashed

64
Q

Block cipher
64-bit block size
16 rounds
Key size: 56 bit x3

A

3DES

Triple DES

65
Q

Practice of disguising information in a way that looks random

A

Cryptography

66
Q

Symmetric Block Mode

-Uses Initialization Vector to encrypt to XOR

A

OFB - Output Feedback

67
Q

PKCS-12

A

Stores certificates and private keys as a package

68
Q

Uses a key pair - public and private key
-public key is only used to encrypt
-private key is only used to decrypt
Used mostly to change a session key securely

A

Asymmetric Encryption

69
Q

Unsigned Certificate

A

Can be made easily - they just don’t have the 3rd party vouching for them

70
Q

Principle that states as long as you don’t know what the key is, you can understand the algorithm completely and still not be able to crack it

A

Kerckhoffs’s Principle

71
Q

ECC

Creates a smaller key than RSA with the same security

A

Elliptic Curve Cryptography

72
Q

Taking something that looks like it makes sense and to hide it so it doesn’t make sense to the outside observer

A

Obfuscation

73
Q

Example of ROT2

A

Turning a decoder ring twice

74
Q

Web of Trust

A

Uses a web of mutually trusting peers and requires a lot of maintenance

75
Q

Symmetric Block Mode

  • Uses NONCE to Counter Value to Encrypt first block to XOR
  • Counter then gets incremented each round
A

CTR - Counter

76
Q

Defined piece of cryptography process that programmers can use to get stuff done - defines key properties, communication requirements for the key exchange and the actions taken through encryption and decryption process

A

Cryptosystem

77
Q

Primary way we encrypt data

A

Symmetric Encryption