Introduction to Cryptography Flashcards

1
Q

Which key is used to sign the certificate issued to businesses by a CA?

A

Private key of the root CA

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is a CA?

A

a trusted third party that signs digital certificates using its private key

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Which key do businesses send to customers to prove its identity?

A

Public key of the company

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What should an administrator use to import and export all items written using X.509 that are part of a chain of trust?

A

Public Key Cryptography Standard (PKCS) #12

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is Public Key Cryptography Standard (PKCS) #12?

A

PKCS #12 defines an archive file format for storing many cryptography objects as a single file. It is commonly used to bundle a private key with its X.509 certificate or to bundle all the members of a chain of trust.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is Public Key Cryptography Standard (PKCS) #7?

A

used for generation and verification of digital signatures and certificates managed by a PKI (Public Key Infrastructure). This standard served as the basis for the S/MIME (Secure/Multipurpose Internet Mail Extensions) standard.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Is AES symmetric or asymmetric?

A

symmetric

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Which two components involved in performing encryption are known to the party that will perform decryption before symmetric encryption is applied?

A

Cryptographic algorithm

Cryptographic key

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Employee A created a secret key and wants to send it to Employee B without any coworkers being able to decrypt the message.

Which key needs to encrypt the message?

A

Employee B’s public key

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is ECB and what does it do?

A

A block cipher mode that encrypts each group with the same key, leaving each group independent of the others.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is a Nonce value?

What can it prevent?

A

An arbitrary number that can be used just once in a cryptographic communication.
It is often a random or pseudo-random number issued in an authentication protocol to ensure that old communications cannot be reused in replay attacks.
They can also be useful as initialization vectors and in cryptographic hash functions. .

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is an Initialization vector used for?

What two block cipher modes have it?

A

It is a type of salt that adds extra random data to prevent duplicate output for the same input byte.
Used for ECB, and the first block of CBC.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is CTR and what does it do?

A

A block cipher mode that

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is GCM and what does it do?

A

Incremental symmetric block cipher mode with authentication, has good performance

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is a XOR?

A

exclusive OR; if two input bits are identical, output is 0. If input is different, output is a 1.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is CBC and what does it do?

A

A block cipher mode that is popular and easy to implement.

Each block is XORed. Very first block uses IV instead of XOR.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

What is CTR and what does it do?

A

A block cipher mode that uses an incremental counter (CTR) for randomization, can behave like a stream cipher.
Applies the XOR to the plaintext, and increments a counter for the next block.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

What is GCM and what does it do?

A

Block cipher mode that combines CTR mode with Galois authentication.
Very efficient with low overhead, used for packetized data such as wireless, IPsec, SSH, TLS.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

What two block modes use XOR and how do they do it differently?

A

CBC XORs by comparing each block to the previous block, very first requires an IV instead.

CTR applies XOR to the plaintext instead and increments the counter for the next block.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

What two block modes use XOR and how do they do it differently?

A

CBC XORs by comparing each block to the previous block, very first requires an IV instead.

CTR (and GCM by extension?) applies XOR to the plaintext instead and increments the counter for the next block.

21
Q

What is the only authenticated block cipher mode?

A

GCM

22
Q

stream cipher is typically not used for what?

A

stream cipher has low power and CPU overhead, therefore it is not paired with asymmetric encryption which has high overhead.

23
Q

Which mode of block encryption results in the same outcome for matching blocks of a plaintext message?

A

Electronic Code Book (ECB)

24
Q

Which cipher mode can have blocks of any size?

A

CTR

25
Q

Uses an initialization vector (IV) to encrypt the first block, then uses the result of the encryption to encrypt the next block

A

CBC mode

26
Q

Skipjack key/block size

A

80-bit key and operates on 64-bit data blocks

27
Q

How many transformation rounds does AES use with a 192-bit key?

A

12

28
Q

How many transformation rounds does AES use with a 128-bit key?

A

10

29
Q

Which encryption algorithm did the National Institute of Standards and Technology (NIST) designate as a specification for the encryption of electronic information?

A

IDEA

30
Q

What is the length (in bits) of an MD5 hash output?

A

128

31
Q

What is the maximum key size for RC4 with WEP?

A

40 bits

32
Q

Symmetric block encryption is ideal for what?

A

transferring large amounts of time sensitive data, encrypted storage

33
Q

Symmetric stream is ideal for what?

A

When speed is a major concern such as video streaming because it uses the same key to encrypt and decrypt large amounts of media.).

34
Q

What is the length (in bits) of the private key used to sign transactions and associated with an individual wallet in the context of Bitcoin?

A

256 bits

35
Q

Which task does a root CA perform before publishing its own certificate?

A

Signing it with its private key

36
Q

What is TKIP and its purpose?

A

It improves WPA over WEP by hashing the initialization vector and secret key

37
Q

Which default port must be open for the IPsec key exchange to be successful?

A

UDP 500

38
Q

Which protocol field number indicates the virtual private network (VPN) is using Authentication Header (AH)?

A

51

39
Q

The two main applications of public-key encryption are what?

A

secret key protection and identity checking.

40
Q

Which combination of cryptographic algorithms is used to create digital signatures based on the U.S. Digital Signature Standards?

A

SHA-2 and RSA

41
Q

Vigenère cipher uses

A

polyalphabetic

cipher

42
Q

BIFID cipher

A

grid that maps scrambled letters into numeric values

and arranging the two-character value (bigram) into two rows.

43
Q

Pigpen is a

A

mono alphabetic
substitution
four grids created in a square and a diagonal shape.

44
Q

What is an HMAC

A

HMAC is a message authentication code that can be used to verify the integrity and authentication of the message. It involves hashing the message with a secret key. It is different from standard hashing, which is purely a one-way function.

45
Q

The RSA cracking method involves what?

A

The RSA cracking method involves using side attacks where the intruder observes the current flows on a processor or the memory utilization of the cache memory storing the private RSA key.

46
Q

a lightweight symmetric encryption method that operates on a 64-bit block using rounds of substitution boxes (S-boxes) and permutation boxes (P-boxes) meant to replace AES

A

PRESENT

47
Q

Which combination of ciphers and keys is used in bitcoin mining?

A

Bitcoin uses elliptic curve ciphers (ECC) with a 256-bit private key, and a 512-bit public key.

48
Q

Which encryption method is used in mobile networks?

A

A5 stream encryption method