IAS Flashcards

1
Q

is the practice and study of techniques for
securing communication and data in the presence of third parties
(adversaries).

A

Cryptography

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Uses the same key for both encryption and decryption.
Fast and efficient, suitable for encrypting large amounts of data.
sharing the secret key securely with the recipient can be challenging
* Used in data storage and bulk data transfer.

A

Symmetric Encryption

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q
  • Involves two keys a public key (used for encryption) and a
    private key (used for decryption).
    Example: RSA (Rivest-Shamir-Adleman), ECC (Elliptic-Curve
    Cryptography), and DSA (Digital Signature Algorithm).
  • Enhances security as the private key does not need to be
    shared.
  • Slower and computationally more intensive compared to
    symmetric encryption.
  • Common in secure communications like SSL/TLS and digital
    certificates.
A

Asymmetric Encryption

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

is the process of converting plaintext into ciphertext
using an algorithm and a key.

A

Encryption

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

is reverting the ciphertext back into plaintext using
the appropriate key.

A

Decryption

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

electronic signatures that verify the
authenticity of a digital message or document. Provide integrity
and non-repudiation.

A

Digital Signatures

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

A symmetric key encryption standard widely used for secure data
encryption.
Known for its strength, speed, and efficiency. Used in both software
and hardware implementations.

A

AES (Advanced Encryption Standard)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

One of the most widely used asymmetric encryption algorithms.
Utilized in secure data transmission, digital signatures, and SSL/TLS
encryption for internet security.

A

RSA (Rivest-Shamir-Adleman)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q
  • Uses elliptic curves to create smaller, more efficient cryptographic
    keys.
  • The same level of security as RSA but with shorter key lengths,
    making it ideal for mobile devices and IoT applications.
A

ECC (Elliptic-Curve Cryptography)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

encrypts sensitive data to prevent
unauthorized access, even if data is intercepted or stolen.

A

Data Protection

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

cryptography defends against
common threats like man-in-the-middle attacks, data breaches,
and phishing scams.

A

Preventing Cyber Attacks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

proper management and storage of
cryptographic keys for data security.
* Importance of using strong keys and regularly updating them to
prevent vulnerabilities.

A

Key Management

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

some older cryptographic algorithms (like
MD5 and SHA-1) are considered weak due to vulnerabilities
and should be avoided.

A

Weak Algorithms

How well did you know this?
1
Not at all
2
3
4
5
Perfectly