Domain 3: Cryptography Flashcards

1
Q

Science of breaking encrypted messages to recover their meaning

A

Cryptanalysis

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q
  • Always hides the true meaning of a message

- Converts messages from plaintext to ciphertext

A

Cipher

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Unencrypted message

A

Plaintext

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Converts plaintext to ciphertext

A

Encryption

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Turns ciphertext back into plaintext

A

Decryption

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q
  • Random number that acts as a placeholder variable in mathematical function.
  • When function is executed, this item is replaced with a random number generated at the moment of processing for one-time use
A

Nonce

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q
  • Historical cipher

- To encrypt a message, you shift each letter of the alphabet three places to the right

A

Caesar Cipher

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q
  • Historical cipher
  • A machine that used a series of three to six rotors to implement a extremely complicated substitution cipher
  • Used by Germans on WWI
A

Enigma

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q
  • Historical cipher

- Machine used by Japanese in WWII for cryptosystems

A

Purple Machine

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Out of the CIA triad what does cryptography provide?

A

Confidentiality and Integrity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

The order of the plaintext should be dispersed in the ciphertext

A

Diffusion

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

The relationship between the plaintext and ciphertext should be as random as possible

A

Confusion

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Use an encryption algorithm to replaces each character of the plaintext with another character

A

Cryptographic Substitution

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Use an encryption algorithm to rearrange the characters of the plaintext, forming the ciphertext message

A

Permutation aka Transposition

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q
  • Key must be generated randomly without any known pattern
  • Key must be at least long as the message to be encrypted
  • Key must be used one time then discarded
A

One-Time Pads

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

In this cipher, the encryption key is as long as the message itself and is often chose from a common book (i.e. Moby Dick)

A

Running Key Cipher

17
Q

Describes how long it will take to break a cryptosystem (decrypt a ciphertext without the key)

A

Work factor

18
Q

Uses one alphabet, in which a specific letter substitutes for another

A

Monoalphabetic cipher

19
Q
  • Uses multiple alphabets

- i.e. Vigenere cipher

A

Polyalphabetic cipher

20
Q

Logical functions that returns a true value when only one of the input values is true

A

Exclusive OR (XOR)

21
Q

Process of selecting the right method (i.e. cipher) and implementation for the right job, typically organization-side scale.

A

Cryptographic Protocol Governance

22
Q
  • Key agreement algorithm

- Use discrete logarithms

A

Diffie-Hellman

23
Q
  • Part of the 3 major public key cryptosystems
  • Uses discrete logarithms
  • Extension of Diffie Hellman key exchange algorithm that depends on modular arithmetic
A

ElGamal

24
Q

Linux systems use _____ to encrypt passwords and this is based on ______.

A

bcrypt

Blowfish

25
Q
  • Cryptographic systems of symbols that represent words or phrases, are sometimes secret, but don’t necessarily provide confidentiality
  • i.e. “10-4” used by law enforcement
A

Codes

26
Q
  • Communication concept specific type of info is exchanged, but no real data is transferred
  • i.e. Digital signatures and digital certificates
A

Zero-knowledge proof

27
Q
  • Info or privilege required to perform an operation is divided among multiple users
  • Ensures no one person has sufficient privileges to compromise the security of the environment
  • i.e. M of N Control
A

Split knowledge

28
Q

Requires that a min number of agents (M) out of a total number of agents (N) work together to perform high-security tasks

A

M of N Control

29
Q

What are the three main methods used to exchange secret keys securely?

A
  1. Offline distribution
  2. Public key encryption
  3. Diffie-Hellman exchange algorithm
30
Q
  • Part of the 3 major public key cryptosystems

- Depends on the difficulty of factoring the product of prime numbers

A

RSA

31
Q

Name the 3 major public key cryptosystems for Asymmetric encryption?

A
  1. RSA
  2. ElGamal
  3. Elliptic Curve Cryptography (ECC)