Cryptography & Encryption II Flashcards

1
Q

A random or pseudo-random value used in cryptographic algorithms to ensure that the same plaintext encrypted multiple times with the same key will result in different ciphertexts. It enhances security by preventing pattern recognition in the encrypted data.

In AES encryption, this is used alongside the encryption key to protect the data from predictable patterns, ensuring the ciphertext is different each time.

A

Initialization Vector (IV)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

A mode of encryption that uses an IV (Initialization Vector) and combines each plaintext block with the previous ciphertext block before encrypting it. This makes the ciphertext dependent on all previous blocks, ensuring patterns are not easily discernible.

Each block of plaintext is XORed with the previous ciphertext block before being encrypted, making it more secure against certain attacks.

A

CBC (Cipher Block Chaining)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

An encryption mode that combines the features of counter mode (CTR) and authentication, providing both data confidentiality and integrity. It uses an IV and generates a unique “authentication tag” to protect against tampering.

widely used in protocols like TLS (Transport Layer Security) to securely transmit data over the internet, as it ensures both encryption and message authenticity.

A

GCM (Galois/Counter Mode)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

A mode of encryption that turns a block cipher into a self-synchronizing stream cipher by using feedback from the previous ciphertext block to encrypt the next block of plaintext.

A

CFB (Cipher Feedback)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

A binary operation that outputs true (1) when the two input bits are different, and false (0) when they are the same. It is widely used in cryptography and error detection because it is reversible—applying this binary operation twice with the same key restores the original data.

In encryption, it is used to combine plaintext with a key to produce ciphertext.

A

XOR (Exclusive OR)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

An encryption mode that uses a counter (a value that is incremented with each block) in combination with a key to generate a stream of “keystream” blocks, which are then XORed with the plaintext to produce ciphertext. It turns a block cipher into a stream cipher.

A

CTR (Counter Mode)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

A mode that combines Counter Mode (CTR) for encryption with CBC-MAC (Cipher Block Chaining Message Authentication Code) for integrity and authentication. It provides both confidentiality and message integrity in a single operation.

Used in secure communication protocols like IPsec to both encrypt the data and verify its integrity.

A

CTM (Counter with CBC-MAC)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

A simple encryption mode in which each block of plaintext is encrypted independently using the same encryption key. While easy to implement, this encryption has significant security weaknesses because identical plaintext blocks produce identical ciphertext blocks, potentially exposing patterns in the data.

If a message contains repetitive data (like a string of “AAAA”), the encrypted ciphertext will also have repeating patterns, making it vulnerable to analysis by attackers.

A

ECB (Electronic Codebook)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Refers to the length of the cryptographic key used in encryption algorithms, typically measured in bits. A larger key size generally provides stronger security, as it increases the number of possible key combinations, making brute-force attacks more difficult.

In AES (Advanced Encryption Standard), these can range from 128, 192, or 256 bits are commonly used.

A

Key Size (or Key Length)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

An integrated circuit that combines all the components of a computer or electronic system on a single chip, including the CPU, memory, input/output ports, and often a graphics processor (GPU). It is commonly used in mobile devices, embedded systems, and IoT devices.

A smartphone uses this to combine its processor, graphics, and memory into a single chip

A

SoC (System on a Chip)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

A modern type of firmware that initializes hardware during the boot process and provides a user interface to configure system settings. It replaces the older BIOS (Basic Input/Output System) and supports larger storage devices, faster boot times, and better security features.

Includes security features like Secure Boot, which prevents the loading of unauthorized operating systems or bootloaders

A

UEFI (Unified Extensible Firmware Interface)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

A feature in Microsoft Windows that allows users to encrypt individual files or folders to protect sensitive data on a file system. It uses public key cryptography to ensure that only authorized users can decrypt and access the files.

Used by businesses to secure sensitive information stored on company devices,

A

EFS (Encrypting File System)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

A physical device that generates, stores, and manages cryptographic keys. It is used to provide a high level of security for cryptographic operations, including key generation, encryption, and decryption, often used in industries that require secure data handling and compliance.

Secure the private keys used in digital signatures

A

HSM (Hardware Security Module)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

A tool in Microsoft Windows that scans and repairs corrupted or missing system files that could cause system instability or performance issues. It uses a specific command to verify the integrity of protected system files and replace incorrect versions.

A

SFC (System File Checker)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

A hardware-based security solution embedded into a computer’s motherboard that securely stores cryptographic keys, passwords, and certificates. It is used to protect sensitive information and enhance the security of the system by supporting functions like full disk encryption, secure boot, and hardware-based authentication.

used to store encryption keys for BitLocker, enabling full disk encryption in Windows.

A

TPM (Trusted Platform Module)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Manages keys and certificates for secure communications.
Example: Used to encrypt emails with public and private keys.

A

PKI (Public Key Infrastructure)

17
Q

Enables remote connections to a network or system.
Example: A VPN that allows employees to securely access the corporate network from home.

A

RAS (Remote Access Service)

18
Q

Manages authentication and distributes encryption keys in Kerberos.
Example: This issues tickets to users to access services in a Kerberos setup.

A

KDC (Key Distribution Center)

19
Q

Provides centralized file storage accessible over a network.
Example: A company uses this to store and share files across multiple departments.

A

NAS (Network Attached Storage)

20
Q

A temporary, single-use password valid for only one login session or transaction, improving security by preventing reuse.

A

OTP - One-Time Password

21
Q

Used in the Kerberos authentication protocol, it’s granted by the Authentication Server after login and used to request access to services.

A

TGT - Ticket Granting Ticket

22
Q

Validates user credentials and issues the Ticket Granting Ticket (TGT) to the user in the Kerberos protocol.

A

AS - Authentication Server

23
Q

Issues service tickets based on the TGT from the Authentication Server, used to access specific network resources.

A

TGS - Ticket Granting Server

24
Q

A dedicated, isolated environment within a device’s hardware designed to protect sensitive data and operations. It provides encryption and security measures, even if the rest of the system is compromised.

Used in Apple devices to protect biometric data, like fingerprints, during Touch ID authentication.

A

Secure Enclave

25
Q

A technique used to hide or obscure sensitive data to make it unreadable or less useful to unauthorized users. It is often used to protect data while allowing it to be processed or analyzed.

Example: Replacing a person’s real name with a pseudonym in a dataset to protect their privacy.

A

Data Obfuscation

26
Q

The practice of concealing information within other non-suspicious data, such as embedding a hidden message within an image or audio file, to avoid detection.

Example: Hiding a secret message inside the pixels of an image file

A

Steganography

27
Q

The process of replacing sensitive data (like credit card numbers) with non-sensitive tokens that can be used in place of the original data while preventing exposure.

Example: Replacing a customer’s real credit card number with a randomly generated token for processing payments securely.

A

Tokenization

28
Q

The process of removing or altering personally identifiable information (PII) from data so that individuals cannot be identified, even if the data is exposed.

Example: Removing names and addresses from a dataset of survey responses to protect privacy.

A

Anonymization

29
Q

The process of replacing identifiable data with pseudonyms, allowing for re-identification through additional information kept separately, often used for data processing and analysis.

Example: Replacing a person’s name with a code that can be mapped back to the original name using a separate database.

A

Pseudo-anonymization

30
Q

The process of modifying data to make it unrecognizable or obfuscated, typically for testing or development purposes, while preserving its structure and format.

Example: Replacing real employee salaries with random values in a copy of the payroll data for testing purposes.

A

Data Masking

31
Q

A function that takes an input (or message) and produces a fixed-size string of characters, which is typically a hash value or digest. It is a one-way process, meaning the original input cannot be easily recovered from the hash.

Example: Storing passwords as hashes in a database so that even if the database is compromised, the original passwords are not exposed.

A

Hash Function

32
Q

A measure of randomness or unpredictability in data, commonly used in cryptography to ensure strong, unpredictable keys. The higher this is, the harder it is for attackers to guess or predict the key.

A

Entropy

33
Q

A security protocol used in WPA2 to provide data confidentiality, integrity, and authenticity for wireless communications, based on AES encryption in counter mode and CBC-MAC for message authentication.

A

AES-CCMP (Advanced Encryption Standard - Counter Mode with Cipher Block Chaining Message Authentication Code Protocol)

34
Q

A method of generating a message authentication code (MAC) using a block cipher in CBC mode, providing data integrity and authenticity by ensuring that the message hasn’t been tampered with.

A

CBC-MAC (Cipher Block Chaining Message Authentication Code)

35
Q

A security protocol using AES in Galois/Counter Mode (GCM) for encryption and authentication, providing high performance and strong security for wireless communication.

A

AES-GCMP (Advanced Encryption Standard - Galois/Counter Mode Protocol)