Encryption Flashcards

1
Q

What are the attributes in encryption?

A
  1. Plain text
  2. Hasing function
  3. Key
  4. Cipher text
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What are the information security objectives?

A
  1. Confidentiality
  2. Integrity
  3. Availability
  4. Auditability
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What are the elements of access control?

A
  1. Identification
  2. Authentication
  3. Authorization
  4. Nonrepudiation
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is symmetric key cryptography?

A

In symmetric key cryptography, key k is used both for encryption (E) of plain text m and for decryption (d) of cipher text c

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What are the problems related to symmetric key cryptography?

A
  1. Key distribution
  2. Secrecy
  3. Usability
  4. Storage
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

How is public key cryptography different compared to symmetric cryptography?

A

A pair of two related keys (PK, SK) are used and it does not matter if someone intercepts PKb because it is public

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What are the advantages of public key cryptography?

A
  1. Users do not have to know each other
  2. Key management
  3. Electronically signed messages
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Which methods are based on SP networks?

A
  1. AES
  2. DES
  3. 3DES
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

How do block ciphers work?

A

They use confusion (adding unknown key values) and diffusion

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

How does the Feistel cipher work?

A

It contains a ladder structure and input is split up into two blocks both containing a function, left half and right half,

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Why do we have 3DES?

A

Because the key in DES was too short

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Which type of encryption are out there?

A

Biometric
End-to-end
Quantum
Homomorphic
Blockchain

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is homomorphic encryption?

A

Fast transmission of highly classified material while keeping material highly secured

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is beneficial about blockchain?

A
  1. Reduced costs
  2. No verification needed
  3. Decreased computing load
How well did you know this?
1
Not at all
2
3
4
5
Perfectly