Cryptography & Encryption I Flashcards

1
Q

A simple, lightweight file transfer protocol that is often used for transferring small files over a network. Unlike FTP, this protocol does not provide authentication or encryption.

Example: Works over UDP

A

Trivial File Transfer Protocol (TFTP)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

A secure version of the FTP protocol, designed to transfer files over a secure SSH connection. It ensures that both the commands and data are encrypted.

A

Secure File Transfer Protocol (SFTP)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

An old, unencrypted network protocol used to remotely access and manage network devices or servers via a command-line interface. It is considered insecure due to the lack of encryption.

A

Telnet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

An extension of the standard FTP protocol that adds SSL/TLS encryption to protect data during file transfers. Unlike SFTP, this relies on FTP over an encrypted channel.

A

File Transfer Protocol Secure (FTPS)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

A standard that extends the format of email messages to support text in character sets other than ASCII, as well as attachments such as images, audio, video, and application files.

Key Note: Allows emails to include attachments

A

Multipurpose Internet Mail Extensions (MIME)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

An extension of MIME that adds security features like encryption and digital signatures to email messages, ensuring the confidentiality, integrity, and authenticity of the email content.

Key Note: Uses X.509 Certificates

A

Secure/Multipurpose Internet Mail Extensions (S/MIME)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

A communication protocol used in computer networks for sending data without establishing a connection. It is part of the Transport Layer in the OSI model and operates in a connectionless manner, meaning it doesn’t guarantee delivery or order of packets.

Key Note: used in real-time applications where speed is crucial, and minor data loss is acceptable (e.g., VoIP, video streaming, DNS).

A

User Datagram Protocol (UDP)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

A widely used standard for digital certificates that authenticate the identity of individuals, devices, or services in a network. They are commonly used in public key infrastructure (PKI) systems to verify that a public key belongs to the entity it claims to represent.

A

X.509 Certificates

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

A protocol developed by Microsoft that allows users to remotely access and control a computer’s desktop over a network. It provides a graphical interface for users to interact with a remote computer.

A

Remote Desktop Protocol (RDP)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

A network protocol used to securely transfer files between computers over a secure SSH (Secure Shell) connection. It is widely used for transferring files in a secure manner across a network.

A

Secure Copy Protocol (SCP)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

A suite of protocols used to secure internet protocol (IP) communications by authenticating and encrypting each IP packet in a communication session.

A

Internet Protocol Security (IPsec)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

A secure connection over the internet that allows users to send and receive data as if they were directly connected to a private network. It encrypts internet traffic, ensuring privacy and security.

A

Virtual Private Network (VPN)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

A database used in networking devices (such as routers or firewalls) to define the security policies for traffic. It is a critical component of IPsec (Internet Protocol Security) implementations and is used to determine how traffic should be encrypted or authenticated.

A

Security Policy Database (SPD)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

A property of secure communication protocols that ensures session keys are not compromised even if the server’s private key is compromised in the future. In other words, each session key is independent and not derived from any long-term keys.

Example: Strengthens the security of session keys.

A

Perfect Forward Secrecy (PFS)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

A protocol used in IPsec to provide authentication and integrity for IP packets. It ensures that the data within an IP packet has not been altered during transmission and authenticates the source of the packet.

A

Authentication Header (AH)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

A protocol used in IPsec to provide confidentiality, data integrity, and authentication for IP packets. Unlike AH, this feature provides encryption for the data payload in addition to authentication.

Provides Confidentiality, Integrity, and Authentication (CIA)

A

Encapsulating Security Payload (ESP)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

A type of wireless network that provides mobile broadband access over a large geographical area, such as a city, country, or even globally. This is often used by mobile devices like smartphones, tablets, and laptops to access the internet via cellular networks (e.g., 4G, 5G).

A

Wireless Wide Area Network (WWAN)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

A small, localized network typically used for connecting personal devices, such as smartphones, laptops, and wearables, over short distances (usually within a range of a few meters).

A

Personal Area Network (PAN)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

A logical grouping of devices within a physical network, allowing network segmentation and isolation of traffic even if the devices are on different physical locations. These help improve security, performance, and management of network traffic.

A

Virtual Local Area Network (VLAN)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

A network protocol used for delivering audio and video over IP networks in real-time. It is commonly used in VoIP (Voice over IP) communications, video conferencing, and streaming media.

A

Real Time Protocol (RTP)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

A signaling protocol used to initiate, maintain, and terminate communication sessions, such as voice and video calls, over IP networks. This protocol is widely used in VoIP applications.

A

Session Initiation Protocol (SIP)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

An extension of RTP that provides encryption, message authentication, and integrity for secure delivery of real-time audio and video streams over IP networks.

A

Secure Real-Time Protocol (SRTP)

23
Q

A security protocol used in wireless networks to provide encryption and data integrity for Wi-Fi (WLAN) communications. It was designed as a temporary solution to improve the security of WEP (Wired Equivalent Privacy) without requiring new hardware.

A

Temporal Key Integrity Protocol (TKIP)

24
Q

A security protocol used in Wi-Fi networks that provides strong encryption and message integrity. It is a replacement for TKIP in WPA2 and is based on the AES (Advanced Encryption Standard) algorithm.

A

Counter Mode with Cipher Block Chaining Message Authentication Code Protocol (CCMP)

25
Q

A cryptographic protocol used to secure communications over a computer network, primarily the internet. This layer ensures that data transmitted between a client (such as a web browser) and a server is encrypted and protected from eavesdropping and tampering.

A

Secure Socket Layer (SSL)

26
Q

A stream cipher developed by Ron Rivest in 1987. It was widely used for encryption in various protocols, including WEP (Wired Equivalent Privacy) and TLS (Transport Layer Security), though it is now considered insecure due to vulnerabilities discovered over time.

A

RC4

27
Q

A security protocol used to secure wireless networks. It is the second generation of the WPA standard, and it replaced WEP (Wired Equivalent Privacy). It uses AES (Advanced Encryption Standard) for encryption, making it significantly more secure than previous protocols.

A

Wi-Fi Protected Access 2 (WPA2)

28
Q

The latest security protocol for wireless networks, designed to provide stronger encryption and improved security features compared to WPA2. It is intended to enhance protection against offline dictionary attacks and improve security in public networks.

A

Wi-Fi Protected Access 3 (WPA3)

29
Q

An outdated and insecure security protocol used to secure wireless networks, particularly Wi-Fi (WLAN). It was part of the original IEEE 802.11 standard, but it has since been replaced by stronger protocols like WPA and WPA2 due to significant security vulnerabilities.

A

Wired Equivalent Privacy (WEP)

30
Q

A set of IEEE (Institute of Electrical and Electronics Engineers) standards that define protocols for wireless local area networks (WLANs). It covers the technology and protocols for wireless communication, including everything from the physical layer (hardware) to the data link layer (protocols for communication between devices).

A

802.11

31
Q

A symmetric key encryption standard that was widely used for data encryption. It has since been largely replaced by more secure algorithms due to its relatively small key size and vulnerabilities.

56-bit key.

A

Data Encryption Standard (DES)

32
Q

A symmetric key encryption algorithm used worldwide to secure sensitive data. It is the most widely used encryption standard today due to its strength and efficiency.

A

Advanced Encryption Standard with 256-bit keys (AES-256)

33
Q

A cryptographic hash function that produces a 128-bit hash value (checksum) used to verify data integrity. It is no longer considered secure due to vulnerabilities.

A

Message Digest Algorithm 5 (MD5)

34
Q

A form of public-key cryptography based on the algebraic structure of elliptic curves over finite fields. This provides a high level of security with relatively small key sizes.

A

Elliptic Curve Cryptography (ECC)

35
Q

A cryptographic hash function that produces a 160-bit hash value. It was widely used for data integrity and digital signatures but is now considered weak due to vulnerabilities.

A

Secure Hash Algorithm 1 (SHA-1)

36
Q

A cryptographic hash function that produces a 256-bit hash value. It is part of the SHA-2 family and is widely used for verifying data integrity and securing sensitive information.

A

Secure Hash Algorithm 256-bit (SHA-256)

37
Q

A cryptographic protocol that provides secure communication over a network. It is the successor to SSL (Secure Sockets Layer) and is widely used to encrypt data transmitted over the internet.

Examples: HTTP over TLS & VPNs

A

Transport Layer Security (TLS)

38
Q

A type of encryption where the same key is used for both encrypting and decrypting data. Both the sender and receiver must have access to the shared secret key.

Algorithms: AES, DES, 3DES

A

Symmetric Encryption

39
Q

A type of encryption that uses a pair of keys: a public key for encryption and a private key for decryption. Only the private key can decrypt data encrypted with the corresponding public key.

Algorithms: RSA, ECC, DSA

A

Asymmetric Encryption

40
Q

A key exchange protocol that allows two parties to securely establish a shared encryption key over an insecure channel. It is a variant of another algorithm with added security due to the use of ephemeral keys.

Example: Generates temporary keys for each session

A

Diffie-Hellman Ephemeral (DHE)

41
Q

A symmetric encryption algorithm designed to provide strong data encryption using a 128-bit key. It was widely used in the early days of secure communication.

A

International Data Encryption Algorithm (IDEA)

42
Q

A data encryption and decryption program used for securing emails and files. It uses both symmetric encryption for the message and asymmetric encryption for key management.

A

Pretty Good Privacy (PGP)

43
Q

A cryptographic key used to encrypt other keys (e.g., session keys or private keys) rather than data directly. It adds an additional layer of security to key management.

A

Key Encryption Key (KEK)

44
Q

A secure authentication method used in Wi-Fi networks, especially in WPA3, to enhance security during key exchange. It replaces the weaker PSK (Pre-Shared Key) method.

A

Simultaneous Authentication of Equals (SAE)

45
Q

A method used for authenticating devices in a Wi-Fi network by sharing a common key (password) among all devices.

Example: Used in WPA, WPA2, and EAP

A

Pre-Shared Key (PSK)

46
Q

A protocol used in the IPsec suite to establish and manage secure communication by negotiating, authenticating, and exchanging cryptographic keys between devices.

Example: Uses Diffie-Hellman

A

Internet Key Exchange (IKE)

47
Q

A key exchange protocol that uses elliptic curve cryptography (ECC) to securely generate shared encryption keys over an insecure network.

Provides Perfect Forward Secrecy (PFS).

A

Elliptic Curve Diffie-Hellman Ephemeral (ECDHE)

48
Q

A cryptographic algorithm used for digital signatures, leveraging elliptic curve cryptography (ECC) for strong security.

Uses: TLS Certificates for secure web communications.

A

Elliptic Curve Digital Signature Algorithm (ECDSA)

49
Q

A feature in Microsoft Windows that allows users to encrypt individual files or folders to protect sensitive data from unauthorized access.

A

Encrypting File System (EFS)

50
Q

A file format used to store private keys, certificates, and optionally the certificate chain. It is also known as PKCS #12.

A

Personal Information Exchange (PFX)

51
Q

A mode of operation for block ciphers that divides plaintext into fixed-size blocks and encrypts each block independently using the same key.

A

ECB (Electronic Codebook)

52
Q

A symmetric encryption algorithm that applies the DES (Data Encryption Standard) cipher three times to each block of data to enhance security.

A

Triple Data Encryption Standard (3DES)

53
Q

An asymmetric encryption algorithm widely used for secure data transmission and digital signatures.

Example: Digital signatures, Secure Key Exchange, and Encryption.

A

Rivest-Shamir-Adleman (RSA)