Encryption Flashcards

1
Q

Symmetric Encryption

A

Symmetric encryption is a type of encryption where the same key is used to both encrypt and decrypt the data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Symmetric Encryptio Attacks

A

Cryptoanalytics and Brute force

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Popular Symmetric Algorithms

A

DES, Triple DES, AES

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Plaintext Size of symmetric algorythms

A

DES & Triple DES - 64, AES -128

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Cipher Size of symmetric algorithms

A

DES & Triple DES - 64, AES -128

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

key Size of symmetric algorithms

A

DES 56, Triple DES - 112, 168, AES -128, 192, 256

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Concerns of DES

A

cryptoanalytic possibilites due to it being the most studied algorithm

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Can the symmetric algorithms be broken?

A

DES can be broken, 1 year using normal computer, 1 hour using super computer
Any with key sizes of 128+ are essentially unbreakble

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Triple DES

A

repeats DES algorithm 3 times using 2 or 3 unique keys.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Benefits of Triple DES

A

key of 168 overcomes brute force attacks and is the same algorithm as DES

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Downside to Triple DES

A

Sluggish and uses 64 bit block size

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

AES

A

Replaces Triple DES, not suitable for long term use

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

ECB

A

Electronic code book - method for multiple block encryption, not secure due to reusing same key.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Modes of operation

A

Overcomes ECB weakness with increased security

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Block Cipher

A

Process input one block of elements at a time. Produces output block for each input block. Can reuse keys. More common

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Stream Cipher

A

Processes input elements continously. Produces output one element at a time. Always faster and uses less code. Encrypts plaintext one byte at a time. Pseudorandom stream is unpredicatble without knowledge of key.

17
Q

Message Authentication

A

Protects against active attacks. Verifies authenticity.
Possible to combine authenticity and confidentiality by encrypting + auth tag. Situations where authentication is used without confidentiality such as broadcast messages

18
Q

Hash Function

A

Process of turning a string into a unique irreversible fixed length value to hide the original message

19
Q

Hash Function Properties

A

Can be applied to data any size
produces fixed length output
H(x) is easy to compute given x
H(x) != H(y)
Collision Resistent (One way)

20
Q

How are Hash Functions attacked

A

Cryptanalysis, brute force

21
Q

Most Widely used hash function

A

SHA - used for password storage, can be used for intrusion detection to verify integrity, as all hashes are unique so will be easy to identify a change

22
Q

Asymmetric Encryption

A

Asymmetric encryption, also known as public-key cryptography, involves two separate keys—a private key and a public key—to encrypt and decrypt data. The public key, which can be shared openly, encrypts data, while the private key, which is kept secret by the owner, is used to decrypt it. This method allows secure communication or data exchange without needing to share a secret key in advance.

23
Q

Asymmetric Encryption Requirements

A

Computationally easy to create key pairs
computationally easy for sender to encrypt with public key
computationally easy for reciever to decrypt with private key
computationally unfeasible to determine private key from public key

24
Q

Most common Asymmetric Algorithm

A

RSA - uses block cipher

25
Q

Digital Signatures Algorithms

A

DSA,
RSA Digital Signature Algorithm, ECDSA (Elipitical curve digital signature algorithm)

26
Q

How are random numbers used

A

They are used to generate keys in public key algorithms, stream cipher, session key, handshake

27
Q

Requirements of a random number

A

Uniform distribution
frequency of occurance of each digit should be the same
No value in sequence can be inferred from the other
unpredictibility

28
Q

Psuedorandom numbers

A

sequences which statisfy statistical randomness tests

29
Q

TRNG

A

True random number generator - uses non-deterministic source to produce randomness

30
Q

Output of hashing algorithms

A

MD5 - 128
SHA-1 160
SHA-256 - 256
SHA-512 - 512

31
Q

Obselete hashing algorithms

A

MD5 & SHA-1

32
Q

Certificate

A

= identity + public key + signature

33
Q

CA Certificate Authority

A

verifies identifies and signs public key certificates

34
Q

PKI Public key infrastructure

A

Set of roles, policies, hardware, software and procedures needed to create, manage, distribute, use, store and revoke digital certificates and manage public key encryption.