Cryptography and Data Security Flashcards

1
Q

Define Cryptography

A

A form of secret writing, any technique to disguise the meaning of a word to those who don’t know how to interpret it

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Define Transposition cipher

A

Swap the ordering of letters around in some fixed pattern

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Define Substitution cipher

A

Takes a letter and replace it with another letter

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Define Man in the Middle

A

Someone intercepts a conversation between a user and application, either to eavesdrop or to impersonate one of the parties

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Define One-Time Pad (OTP)

A

Single-use, pre-shared key shared by sender and recipient

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What are some requirements for OTP

A

Requires true randomness (Atmospheric noise detected by radio receiver), security of the pad, and no reuse

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Define Polyalphabetic ciphers

A

Any cipher based on substitution, using multiple substitution alphabets

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is the problem with Polyalphabetic ciphers

A

If the Man in the Middle knew the cipher’s algorithm, the code is broken not just for you but for everyone using the system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Define Kerckhoffs’s Principle

A

The concept that a cryptographic system should be designed to be secure even if all its details, except the key, are publicly known

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Define Diffie-Hellman Algorithm

A

A key-exchange protocol that enables two parties communicating over a public channel to establish a mutual secret without it being transmitted over the internet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

How does the Public Key/Private Key pairs work

A

You publish the public key online, so anyone can use it to lock up their message to you in a box
You keep the private key a secret, so only you know, and only you can open the messages encrypted with the public key
Anyone can encode a message to send to you using the public key, but only the private key can decrypt it

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Define Symmetric cryptography

A

A symmetrical key is one that is used to both encrypt and decrypt infromation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Define Asymmetric cryptography

A

A process that uses a pair of related keys, one public key and one private key, to encrypt and decrypt a message and protect it from unauthorised access for use

How well did you know this?
1
Not at all
2
3
4
5
Perfectly