Cryptography Primer 4.1 Flashcards

1
Q

Is a digital object that is tied to cryptographic key pair; use case Authentication

A

Digital Certificates

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Mathematically complex modern cipher

A

Algorithm

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Secret valued used with an algorithm

A

Key(crypto variable)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Term used to describe a weak cryptographic element

A

Deprecated

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

A separate processor and micro kernel used for storing and processing cryptographic keys in mobile devices

A

Secure enclave

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Number of possible key combinations

A

Keyspace

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Is the process of encoding information; use case Confidentiality

A

Encryption

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Is a one-way function that turns a file or string of text into a unique digits of the message; use case Integrity

A

Hashing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Term that the algorithm and/or key length is exploitable

A

Broken

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Is a harden, tamper-resistant hardware device that secures cryptographic keys and related information

A

Hardware Security Module (HSM)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Consists of programs, data formats, procedures, communication protocols, security policies, and public key cryptographic mechanisms working together in a comprehensive manner to enable communication

A

Public Key Infrastructure (PKI)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Is a hardware chip used for storing cryptographic keys related information

A

Trusted Platform Module(TPM)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Is a hash value encrypted using the senders private key; use case sender Authenticity non-repudiation

A

Digital Signature

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Is a technique that transforms plaintext into cipher text and back to plaintext

A

Cipher

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Is encrypted or human unreadable text

A

Ciphertext

How well did you know this?
1
Not at all
2
3
4
5
Perfectly