cypto and PKI Flashcards

1
Q

what is cryptography?

A

science of encrypting or hiding information

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

what is differential cryptanalysis

A

compare inplut plaintext to output ciphertext to determine encryption key

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

what is linear cryptanalysis

A

takes plaintext through a simplified cipher to deduce what the encryption key is likely to be

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

why is hashing done

A

to provide intergrity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

why are digital signatures used

A

provide non-repudiation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

different types of data usage?

A

data in transit, data at rest, and data in use

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

what is in a symmetric algorithm

A

a private shared key used to encrypt and decrypt data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

what are the common symmetric algorithms?

A

3DES, AES, Blowfish, twofish, and RC4

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

what is asymmetric algorithms?

A

uses two keys instead of one example is PKI

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

what two keys are used in PKI?

A

private and public key

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

what are some popular asymmetric algorithms?

A

RSA, diffie-hellman, ECC, and ElGamal

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

diffusion

A

form of dispersion in plaintext and ciphertext

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

confusion

A

randomness of output increases entropy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

collison

A

two inputs same hash output

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

ephermal key?

A

used only once after generation keys

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

what data does tls and ssl protect?

A

data in transit

17
Q

what is data at rest encryption example?

A

whole disk encryption

18
Q

cryptographic provider?

A

library that implements cryptographic functions

19
Q

does diffie hellman allow in band or out of band key exchange?

A

in band even if entire data stream is being viewed

20
Q

why is salting used?

A

provide more entropy eliminate problem of identical passwords

21
Q

what modes are the most secure?

A

CBC and CTM/CTR

22
Q

what are two encryption operation modes?

A

block and stream

23
Q

why isn’t asymmetric suitable for bulk encryption?

A

because they are slower than symmetric methods

24
Q

difference between dhe and ecdhe in diffie hellman?

A

ecdhe uses ecc while dhe uses temporary key

25
Q

what is weak in wep?

A

IV used is sent in plaintext

26
Q

why is wpa2 better than wpa?

A

it uses aes instead of TKIP