Cryptography, Hashing, Bcrypt Flashcards

1
Q

What is encryption?

A

Encryption is the practice of scrambling information in a way that only someone with a corresponding key can unscramble and read it. It is a two-way function.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What do you use to encrypt data?

A

A cipher, which is an algorithm used to encrypt and decrypt information.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What are the five types of ciphers mentioned

A

Shift Ciphers, Substitution Ciphers, Transposition Ciphers, Polyalphabetic Ciphers, Nomenclator Ciphers.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

How does a shift cipher work?

A

Parties determine a number between 1-25 and shift the letters that number of spaces in the alphabet. The shift number serves as the key.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is a substitution cipher?

A

These ciphers replace plaintext with ciphertext using an algorithm that is a fixed system.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

How does a transposition cipher work?

A

This algorithm uses a set of rules to change the order of the text into different permutations that can then be encrypted.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is a polyalphabetic cipher?

A

A type of substitution cipher that uses multiple alphabets to further complicate unauthorized decryption of the ciphertext.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is a nomenclator cipher?

A

A type of substitution cipher that replaces common plaintext words with symbols to try and throw off cryptanalysis.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is asymmetric encryption?

A

Asymmetric encryption uses one key to encrypt and another key to decrypt. The public key is used to encrypt data. The private key is used to decrypt data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is symmetric encryption?

A

Symmetric encryption uses a single key that can both encrypt and decrypt.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Common Encryption Algorithms

A

AES(advanced encryption standard), RSA(Rivest-Shamir-Adleman), ECC(Elliptic Curve Crypt), PGP(Pretty Good Privacy)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is hashing?

A

Hashing is the use of an algorithm to convert data of any size to a fixed length string resulting in a hash value.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is a hash value also known as?

A

A checksum

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Is hashing a reversible process?

A

No, hashing is a one-way function and should be basically irreversible.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is MD4? And MD5?

A

MD4 is a hash algorithm created in 1990.MD5 successor to md4

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What does SHA stand for?

A

Security Hashing Algorithm.

16
Q

What is Bcrypt?

A

Bcrypt is a Key Derivation Function (KDF) based on the blowfish algorithm, known for being computationally expensive and configurable to grow with newer hardware.

17
Q

Name two other KDF

A

PBKDF2(comp exp), Argon2(slow to compute and memory intensive)

18
Q

What is salting in the context of password hashing?

A

Salting is adding a unique value to the end of a password to create a different hash value, adding a layer of security against brute force attacks.

19
Q

What is a brute force attack?

A

A brute force attack is where a computer or botnet attempts every possible combination of letters and numbers until the password is found.

20
Q

Why is it important to use salting with hashing?

A

Salting prevents attackers from successfully using precomputed hashes (rainbow tables) to crack passwords.

21
Q

What should you consider about the computational cost of a hashing algorithm?

A

The hashing algorithm should be computationally expensive to slow down attackers attempting brute force attacks.

22
Q

What is the computational cost in the context of cryptographic algorithms?

A

The computational cost refers to the amount of computational resources (time and processing power) required to execute a cryptographic algorithm.

23
Q

Why is a high computational cost desirable for certain cryptographic operations like hashing passwords?

A

A high computational cost makes it more difficult and time-consuming for attackers to perform brute force attacks, as each attempt to guess the password takes longer.