Dion Cryptography - pg86 Flashcards

1
Q

What is cryptogrpahy?

A

A way to hide the true meaning of information.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is encryption?

A

Process of converting ordinary information into an unintelligible form.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is Data at Rest?

A

Inactive data that is stored on a hard drive or other storage device.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is Data in Transit?

A

Data that is moving between devices - on the internet, crossing the network, or data in a computer’s memory.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is Data in Use?

A

Data that is currently being processed - in the CPU.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is ROT13

A

A rotation cypher that moves the letters of the alphabet 13 times.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is plain text?

A

The initial message that has not yet been encrypted.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is ciphertext?

A

The message once it has been encrypted.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is more important when strengthening encryption? The key or the algorithm?

A

The Key!!

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is an encryption key?

A

The essential piece of info that determines the output of a cipher.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is symmetric encryption?

A

Uses an encryption algorithm, where the sender and receives must have the same key.

Confidentiality is assured.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is symmetric encryption also known as?

A

Private Key

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

How can you distribute the key for symmetric encryption?

A

By using asymmetric encryption!

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What are the 9 symmetric algorithms?

A
  1. DES
  2. 3DES
  3. IDEA
  4. AES
  5. Blowfish
  6. Twofish
  7. RC4
  8. RC5
  9. RC6
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is asymmetric encryption?

A

Use two keys - public and private, to encrypt and decrypt data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Name the 3 asymmetric algorithms

A
  1. Diffie-Hellman
  2. RSA
  3. ECC
17
Q

Which is faster - symmetric or Asymmetric? By how much?

A

Symmetric by 100-1000x faster!

18
Q

What is hybrid Implementation?

A

Uses asymmetric encryption to transfer a private key to be used with symmetric encyrption

19
Q

What is a Stream Cipher?

A

Uses a keystream generator to encrypt bit by bit using XOR function to create ciphertext.

20
Q

What is a Block Cipher?

A

Breaks up data into fixed length blocks, which are then encrypted.

Easy to use with software.

21
Q

What is DES?

A

Data Encryption Standard

16 round
64 bit blocks
Uses a 56 bit encryption key

22
Q

What is 3DES?

A

Triple DES

Uses 3 symmetric keys, one after another

23
Q

What is IDEA?

A

International Data Encryption Algorithm

Symmetric Block Cipher
64-bit block

24
Q

What is AES?

What are the 3 bit block lengths that can be used

A

Advanced Encryption Standard
Symmetric Block Cipher

128, 192, 256 bit blocks and MATCHing key size.

Standard for US Gov

25
Q

What is Blowfish?

A

Symmetric Block Cipher

64 bit block
Variable length key

Replaced by Twofish!

26
Q

What is Twofish?

A

Symmetric Block Cipher

128 bit blocks
128, 192, 256 bit keys

Replaced blowfish

27
Q

What is RC4?

A

Rivest Cipher 4

Symmetric STREAM cipher (the only one on the exam!!!)

Variable key size from 40 bits to 2048 bits.
Used in SSL and WEP

28
Q

What is RC5?

A

Rivest Cipher 5
Symmetric Block Cipher

Key size up to 2040 bits

29
Q

What is RC6?

A

Rivest Cipher 6

Symmetric Block Cipher developed to replace DES but AES won!

30
Q

What is asymmetric cryptography also know as?

What 4 things does it provide?

A

Public Key Cryptography

  • Confidentiality
  • Integrity
  • Authentication
  • Non-repudiation
31
Q

What is a digital signature?

A

A hash digest of a message encrypted with the sender’s private key, which is sent and then decrypted with your public key and checked to see if it is the same.

32
Q

What is PKI?

A

Public Key Infrastructure

33
Q

What is DH?

A

Diffie Hellman Algorithm

Asymmetric
Used to conduct key exchanges
Used to establish VPN tunnels using IPSec

34
Q

What is RSA?

A

Rivest, Shamir and Adleman

  • Asymmetric
  • Uses prime numbers
  • Used widely for key exchange, encryption and digital signatures

Key size from 1024 - 4096bits!

35
Q

What is ECC?

A

Elliptic Curve Cryptography

  • Asymmetric
  • Uses algebraic structure of elliptic curves over finite fields to make keys
  • Used for low-power computing (mobiles)
36
Q

Which ECC key length is the same secure level as an RSA 2048-bit key?

A

256 bit key!

37
Q

What are the 3 sub types of ECC?

A

ECDH - Elliptic Curve Diffie-Hellman
ECDHE - Elliptic Curve Diffie-Hellman Ephemeral
ECDSA - Elliptic Curve Digital Signature Algo