Cryptography, hashing and protection Flashcards

1
Q

Encryption

A

Encryption uses an algorithm to scramble, or encrypt, data and then uses a key for the receiving party to unscramble, or decrypt,
the data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Plaintext

A

Data in its readable form

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

ciphertext

A

data in its unreadable, encrypted form

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Encryption vs hashing

A
  • Hashing of passwords is one way function (convert plaintext to ciphertext but NOT back again)
  • Encryption is a two-way function (convert plaintext to ciphertext and back again)
  • Hashing is preferred as the ability to decrypt passwords provides a security risk.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Cryptography definition

A

The study of securing data from outside observers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Encryption definition

A

The act of scrambling readable data into unreadable ciphertext

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Decryption definition

A

The act of unscrambling ciphertext into readable data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Algorithm

A

The set of steps that the encryption and decryption process follows

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Encryption keys

A

Key: a random string of bits created specifically for encrypting and/or decrypting data.
Symmetric-key encryption:
* Encryption and decryption uses the same key.
* The key must be kept secret.
Asymmetric-key encryption:
* Encryption and decryption use different keys
* Keys are mathematically relatedbut it is computationally not feasible to find one from another.
* Encryption key can be made public.
* Decryption key must be kept secret.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Confidentiality

A
  • Keeps information away from unauthorised persons
  • One way of achieving this is by using mathematical algos for data encryption
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Integrity

A
  • Data may get modified intentionally or accidentally
  • This makes sure that the data is still intact since it was last transmitted or stored
  • It allows you to see whether the modification of data was necessary or not
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Non - repudiation

A

*Is a security service that ensures that an entity cannot refuse the ownership of a previous commitment or an action.
- It is assurance that the original creator of the data cannot deny the creation or transmission of the data to a third party

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Authentication

A
  • Provides identification of originator
  • It confirms to the receiver that the data received has been sent only by an identified/ verified sender
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

2 types of authentication

A

Message authentication - Identifies the originator of the message without any regard of who has sent the messages
Entity authentication - assurance that the data has been recieved from a specific entity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Salting

A

*A salt is a unique, randomly generated string that is added to each password as part of the hashing process.
*As the salt is unique for every user, an attacker has to crack hashes one at a time using the respective salt,
rather than being able to calculate a hash once and compare it against every stored hash.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Generating a salt

A
  1. Generate a salt using a cryptographically secure function.
    * The salt should be at least 16 characters long.
    * Encode the salt into a safe character set such as hexadecimal or Base64.
  2. Combine the salt with the password.
    * This can be done using simple concatenation.
  3. Hash the combined password and salt.
  4. Store the salt and the password hash.