Hashing Flashcards

1
Q

Collision

A

It is a hash function which produces the same value for two different inputs, the result is known as a collision

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

RSA rivest shamir adelman

A

RSA user creates and publishes a public key based on two prime numbers, along an auxiliary value. Prime numbers are kept in secret.message can be encrypted by anyone via public key, but can only be decrypted by private key. Authentication agents and RSA secur ID tokens work to authenticate user. Keys tend to be 1024-2048 bits.works with encryption and digital signature.
From 1977 oldest cryptosystem used to secure data transmission

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Salting

A

Salts are random values appended to the input to negate the value of rainbow tables. Rainbow tables are publicly available tables of precomputed hashes to crack the password in database

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

RIPEMD

A

Used in bitcoin, the message is converted of irregular value of fixed length. Message is protected by compression function in 512 bites clocks, passed thru 2 streams of this sub-block by using 5 different versions in which the value of constant „k” is also different

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

HMAC hashed message authentication code

A

Is a hashed value that includes a symmetric key. Cannot be reproduced without key, provides integrity and data orgin authentication, used to cryptography protocols

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Hashing

A

Proves integrity, produces visual representation of a data set that can be used for comparative purposes. The output is known as a message digest, fingerprint or hash value validators. If message has not been changed during transmission, verify that original file hash not been altered, verify that forensic clone is the exact the same as media

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Sha - secured hashing algorithm

A

Modified version of MD5 for hashing data and certificates, SHA shortens the input data into smaller form that cannot be understanding bitwise operations, modular addictions, compression functions

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

DSA digital signature algorithm

A

Is a federal standard for processing, also cryptosystem using digital signature, utilizes discrete mathematic logarithm problem to generate two digital signatures.used to public and private key.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Digital signature

A

To prove integrity and non repudiation, receiver can trust the message. This message digest is encrypted using senders private key

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Non-repudiation

A

Means that the signer cannot deny sending the message

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

One-way representation

A

One way hash function (message digest) mathematical function that takes variable -length input string and converts it to fixed-length binary sequence that is computionally difficult to invert

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

MD - message digest strengthening

A

This is a technique of padding a message within an encoding of the message length to avoid various prefix and extension attacks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Fingerprint

A

Unique fixed length representation of data (hash/message digest)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

TLS (transport layer security protocol

A

Widely adopted security protocol designed to facilitate privacy and data security for communications over the internet. Use case of this is encrypting the communication between web apps and servers such web browsers loading a website

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

IPSEC crypto protocol

A

A set of communication rules or protocols for setting up secure connection over a network. IPSEC adds encryption and authentication to make protocol more secure

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

IP (internet protocol)

A

The common standard that determines how data travels over internet.

17
Q

Hashing compression function

A

Takes a fixed length and returns a shorter fixed length output. The blocks are then processed sequentially. Taking as input the result to the hash so far and the current message block, with the final output being the hash value for the message

18
Q

Bitwise operations

A

Are widely used in encryption algorithms for encryption and decryption. The XOR operator is commonly used to combine bits between the original text and a secret key encryption

19
Q

XOR

A

If a single operant is one, returns a one inebit position

20
Q

Operand

A

Value or expression that is used to perform operation