General Security Concepts: Examining Hashing and Obfuscation Flashcards

1
Q

What is hashing, and how does it apply to security?

A

Hashing is a cryptographic operation that transforms data into a fixed-length string of characters known as a hash or hash value. The length of a hash, or output, doesn’t change for any given input, and it supports integrity and authenticity verification.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What are the variety of Hashing algorithm?

A

Message Digest 5 (MD5)
Secure Hash Algorithm 1 (SHA-1)
SHA-256
SHA-3
bcrypt
Argon2
RACE Integrity Primitives Evaluation Message Digest 160 (RIPEMD-160)
Whirlpool
BLAKE2
SipHash

Note: You should carefully consider the specific requirements of your application and security needs, and the current state of cryptographic knowledge, before choosing a hashing algorithm. Additionally, always use well-established and recommended algorithms for security-critical applications.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What does MD5 do?

A

Message Digest 5 (MD5): 128-bits long, it provides fast computation and is widely supported. However, it’s vulnerable to collision attacks, and isn’t suitable for security-sensitive applications.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What does Secure Hash Algorithm 1 (SHA-1) do?

A

Secure Hash Algorithm 1 (SHA-1): 160-bits long, it’s faster than SHA-256 and widely supported. However, it’s also vulnerable to collision attacks and has been deprecated for security-critical use.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What does SHA-256 do?

A

SHA-256: 256-bits long, it provides strong security and resistance to collision attacks. However, it’s slower than MD5 and SHA-1 but generally is secure for most applications.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What does SHA-3 do?

A

SHA-3: It has a configurable length, such as SHA3-256 and SHA3-512, and provides high security, resistance to various attacks, and based on different principles than SHA-2. However, it’s relatively new and hasn’t been widely adopted yet.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What does bcrypt do?

A

bcrypt: Based on the Blowfish cipher, bcrypt has variable length. It’s slow and computationally expensive, and is suitable for password storage. However, because it’s slower, performance issues can result.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What does Argon2 do?

A

Argon2: Has a variable length, and is highly resistant to brute force and GPU-based attacks. It’s designed for password hashing. However, newer algorithms may result in limited support in some environments.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What does RIPEMD-160 do?

A

RACE Integrity Primitives Evaluation Message Digest 160 (RIPEMD-160): 160-bits in length, it’s faster than some other algorithms but is vulnerable to collision attacks. It’s not recommended for high-security applications.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What does Whirlpool do?

A

Whirlpool: 512-bits in length, it provides strong security and is resistant to known attacks. However, it can be slower than some other algorithms.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What does BLAKE2 do?

A

BLAKE2: Has a variable length, such as BLAKE2s and BLAKE2b, and provides high performance and security. It’s suitable for various applications but has been less widely adopted when compared to older algorithms.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What does SipHash do?

A

SipHash: Has a variable length, such as SipHash-2-4 and SipHash-4-8, and is designed for hashing data structures and protecting against hash-based attacks. However, it’s not a general-purpose hash, and is suitable for specific

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is obfuscation?

A

Obfuscation is the practice of deliberately making data and code, including malware, more difficult to understand or analyze. You can use it to protect sensitive information, create covert communication channels, and deliver malware.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is steganography?

A

Steganography is a method of hiding secret information within nonsecret data, such as images, audio files, or text. You can use it to conceal a secret message or covert communication channel.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is tokenization?

A

Tokenization is a method of converting sensitive data, such as credit-card numbers or personal information, into nonsensitive tokens. You can use it to securely store sensitive data and then transmit nonsensitive tokens to reduce the risk of data breaches.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is data masking?

A

Data masking is a protection technique that replaces sensitive information, such as organizational data, in a dataset that has fictional or scrambled data. It preserves the format of the sensitive information while reducing the risk of exposure or unauthorized access.

17
Q

What are some of the examples of Steganography?

A

Image Steganography:

Least Significant Bit (LSB) Method: The most common technique where the least significant bits of the pixels in an image are replaced with the bits of the secret message. The changes are usually imperceptible to the human eye.
Example: Hiding a text message within an image file.

Audio Steganography:

Embedding a secret message within an audio file by manipulating the digital representation of the audio signal. This can be done by altering the least significant bits of the audio samples.
Example: Embedding a hidden message within an MP3 file.

Text Steganography:

Concealing messages within text files by using subtle changes, such as adjusting the spacing between words or lines, or using fonts and invisible ink techniques.
Example: Adding extra spaces or tabs in a text document to encode a hidden message.

Video Steganography:

Hiding data within video files, either by manipulating the individual frames of the video or by embedding data within the audio track of the video.
Example: Embedding a hidden message in a video file by altering the pixel values of certain frames.

Network Steganography:

Embedding information within network protocols and traffic patterns. This can be done by manipulating packet headers, timing of packets, or using covert channels.
Example: Hiding data within the headers of TCP/IP packets.

18
Q

What are the example of Tokenization?

A

Example of Tokenization:

Credit Card Processing:
Imagine a company needs to store customer credit card information securely. Instead of storing the actual credit card number, the company can use tokenization to store a token.

Original Data:

Credit Card Number: 4111 1111 1111 1111

Tokenization Process:
The credit card number is sent to a secure tokenization server.
The server generates a token that is mapped to the credit card number.
Token: TKN-1234567890

Stored Data:
Instead of storing the credit card number, the company stores the token.
Token: TKN-1234567890

Detokenization:
When the original credit card number is needed (e.g., for processing a transaction), the token is sent to the tokenization server.
The server retrieves the original credit card number using the token and sends it back securely.
Example in Context:
Step-by-Step Tokenization Process in a Payment System:

Customer Purchase:
A customer enters their credit card information on an e-commerce website.

Tokenization Request:
The website sends the credit card information to the tokenization server.

Token Generation:
The tokenization server generates a unique token for the credit card number, such as TKN-1234567890.

Token Storage:
The e-commerce website stores the token (TKN-1234567890) instead of the actual credit card number in its database.

Payment Processing:
When a payment needs to be processed, the website sends the token to the tokenization server.

Detokenization:
The tokenization server retrieves the original credit card number (4111 1111 1111 1111) using the token.

Transaction Completion:
The original credit card number is used to complete the transaction securely.

19
Q

What are the methods of Data Masking?

A

Scrambled information - Such as UserID to Random ID
Substitution - Street name 01 to Street Name 02
Partial masking - Credit info XXX XXX XXX 306
Randomized - Birthdate to Alternative Date