Cyptography and Society Flashcards

1
Q

What is modern cryptography

A

the study of mathematical techniques for security digital information, systems and distributed computations against adversarial attacks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is Casesars cipher

A

one of the oldest recorded ciphers, does this by shifting letters backwards and forwards

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is security by obscurity

A

improving security by keeping the algorithm secret

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Define Kerchoffs’ principle

A

the cypher method must not be required to be secret, and it must be able to fall into the hands of the enemy without inconvenience

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Define the sufficient key-space principle

A

any secure encryption scheme must have a key space that is sufficiently large to make an exhaustive-search attract infeasible

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is the mono-alphabetic substitution cipher

A

it defines a map from each letter to some letter of the alphabet, where the map is arbitrary, instead of a fixed shift

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What can cryptography be

A

symmetric or asymmetric

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is the key distribution problem

A

if the key is compromised they would have to create a new one again, it is overall slow and not scalable; how are they going to stop the spread of the keys

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is asymmetric cryptography

A

There is a public key and private key, they share the public key to encrypt it and the only way to decrypt is via the private key

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is a way a message can be encrypted via asymmetric cryptography

A

RSA

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

How is asymmetric cryptography different to symmetric

A

it has authentication, integrity and accountability (non-repudiation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is a digital certificate

A

A certificate authority can issue a digital certificate to prove the ownership of a public key

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What does cryptography rely on

A

the lack of an efficient factorization algorithm

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

How can attack cryptography

A

Buteforce (e.g. try all combinations, side channel attack
differential cryptanalysis)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What were the issues with the heartbleed bug

A

it would bring up previous requests and therefore private information, as it would request more data and it would provide data from memory of previous users

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What did the DROWN attack stand for

A

Decrypting RSA with Obsolete and Weakened encryption

17
Q

What caused the DROWN attack

A

SSLv2 an obsolete version of SSL that has been deprecated due to having several security flaws

18
Q

What was another factor caused by the DROWN attack

A

the hacking of one server coul allow the hacker to gain access to the other severs that may not have the software issue as they gain access the private key

19
Q

What percentage of HTTPS severs still allows SSLv2

A

17%

20
Q

What is HTTP

A

Hypertext transfer protocol - not encrypted

21
Q

What is HTTPS

A

Hypertext transfer protocol secure - encrypted

22
Q

How does the onion router work

A

already encrypted traffic moving from node to node with each different node removing one of the layers of encryption revealing its next destination not where it is going to end up

23
Q

What have TOR networks been used for

A

Selling drugs, pornography securely

24
Q

What is end to end encryption

A

Messages and files are encrypted before they leave the device and are only decrypted when they reach their destination.

- IT has been argued that now end to end encyrption is being used to hide criminal activity
- Some companies are chooseing to pan end to end encyrption
25
Q

What is Zimmermann’s law

A

The natural flow of technology tends to move in a direction of making surveillance easier and the ability of computers to track us doubles every eighteen months