Intro + Number Theory Flashcards

Chapter 1-2

1
Q

What is cryptography?

A

The study of mathematical techniques related to information security

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What are the four main goals of cryptography?

A

Confidentiality
Data integrity
Authentication
Non-repudiation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Non-repudiation means?

A

It ensures that a party cannot deny sending a message or signing a document, typically achieved using digital signatures.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Data Integrity means?

A

Ensures that data is not altered or tampered with during transmission (e.g., using checksums or hash functions).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Confirms a user’s or system’s identity (e.g., verifying a password or digital signature) is the definition of

A

Authentication

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Ensures that information is only accessible to authorized users, preventing unauthorized access (e.g., encryption) is the definition of

A

Confidentiality

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is symmetric-key encryption?

A

A type of encryption where the same key is used for both encryption and decryption

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

An encryption method where two different keys (public and private) are used for encryption and decryption is called

A

Public-key encryption

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Ensuring that information has not been altered by unauthorized means during transmission is

A

Data integrity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is a digital signature?

A

A cryptographic mechanism is used to bind an entity’s identity to a piece of information, ensuring authenticity and integrity.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

A function that converts an input into a fixed-size string of bytes, typically used to ensure data integrity is called

A

Hash function

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

It deals with the generation, distribution, storage, and destruction of keys to ensure secure communication is the purpose of

A

Key management in cryptography

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is key escrow?

A

A system where encryption keys are stored by a third party to allow access under certain conditions, such as in legal cases.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

It states that for any integer a and positive integer n, there are unique integers q (quotient) and r (remainder) such that:
𝑎=𝑞𝑛+𝑟 where 0≤𝑟<𝑛

A

The Division Algorithm

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is the Euclidean Algorithm used for?

A

It is used to find the greatest common divisor (GCD) of two integers.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is modular arithmetic?

A

It’s a system of arithmetic for integers, where numbers “wrap around” upon reaching a certain value, known as the modulus.

17
Q

If p is a prime number and a is an integer not divisible by p, then
a ^(p−1 )≡1 modp.

A

Fermat’s Little Theorem

18
Q

What is Euler’s Totient Function ϕ(n)?

A

The count of integers less than n is relatively prime to n. For a prime number p, ϕ(p)=p−1.

19
Q

What does the Chinese Remainder Theorem state?

A

It provides conditions under which a system of simultaneous congruences has a unique solution modulo the product of the moduli.

20
Q

Tntegers greater than 1 that have no divisors other than 1 and themselves.

A

Prime numbers

21
Q

The largest integer that divides two numbers without leaving a remainder.

A

Greatest common divisor(GCD)

22
Q

What are discrete logarithms?

A

Given a number
b=g ^(x) modn, the discrete logarithm problem involves finding x, given b, g, and n.