Cryptography Primer Flashcards

1
Q

Digital certificates (DC)

A

Is a digital object that is tied to a cryptographic key pair. The use case is authentication

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Key (cryptovariable)

A

Is a secret value used with an algorytm

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Depreciated algorithm

A

The use of algorithm and key length is allowed but the user must accept some risk due to inherent weaknesses. Example 3DES

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Hashing

A

One-way function that turns a file or string of text into a unique digest of the message. The use case for hashing is integrity.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Broken

A

Means that the algorithm and/or key length is exploitable

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Encryption

A

Is a process of encoding information. The use case of encryption is confidentiality

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

HSM hardware security module

A

Hardened temper-resistant hardware devices that secure cryptographic keys and related info. Used in large environments. These are clusters with redundant power. Securely store thousands of cryptographic keys. This is high-end cryptographic hardware as plug in card or separate hardware device. It provides secure storage and key backup in hardware. Can have cryptographic accelerators

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

PKI - public key infrastructure

A

Consists of programs, data formats, procedures, communication on protocols, security policies, and public key cryptographic mechanisms working together in a comprehensive manner to secure communication

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

TPM trusted platform module

A

Hardware chip used for sharing cryptographic keys and related information

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

DS digital signatures

A

This is a hash value encrypted using the senders private key. Use case is the sender authenticy and non-repudiation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Cipher

A

Is a technique that transforms plain text into ciphertext and back to plain text

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Algorithm

A

Mathematically complex modern cipher, mathematic complex definition of technique that transforms plain text into ciphertext into ciphertext and back to plain text

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Secure Enclave

A

Separate processor and microkernel used for storing and processing cryptographic keys and related info in mobile devices. Separate processor with his own boot ROM and monitors the system boot process, has tru random number generator and can do real time memory encryption as it moves in or out of the memory.there are root crypto keys, which cannot be changed. It does AES (advanced encryption) in the hardware of your device.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Ciphertext

A

Is encrypted or human unreadable text

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Cryptography

A

Conversion of communication into a form that can only be read by the intended recipient. It also includes assurance of integrity and sender identity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Cryptography

A

Conversion of communication into a form that can only be read by the intended recipient. It also includes assurance of integrity and sender identity

17
Q

Steam cipher

A

Algorithm using one-by-one bit of data XOR function

18
Q

Block cipher

A

Works on blocks of data

19
Q

Confusion

A

Process of changing the values

20
Q

Diffusion

A

Process of changing the order

21
Q

Non-repudiation

A

Ensure that data sent to the third party is able to verified, that information really comes from the sender.

22
Q

Non-repudiation

A

Ensure that data sent to the third party is able to verified, that information really comes from the sender.

23
Q

Proof of integrity

A

The data does not been changed, in crypto we use a hash, in the data changes - hash changes. Hash verify data but do not weirdly who send the data.

24
Q

Proof of orgin

A

Prove that messages was not changed(integrity), prove the source of the message (authentication). Make sure that signature is not fake (non-repudiation).
Digital signature by private key and verified by person public key.

25
Q

Creating digital signature

A

X => provide digital signature for plain text => message is hashed by algorithm=> hash of plain text encrypted by X private key => sending hash with digital signatue=> receiving message by Y plain text and digital signature=> decryption of digital signature by X public key =>seeing hash of plain text (message) => by hashing algorithm decrypting the message
Optionally Y can compare hashes