Introduction to Cryptography C3A Flashcards

1
Q

Secure Systems

A
  1. Security Policy
  2. Security Environment
  3. Security Mechanisms
  4. Monitoring and auditing procedures
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is Encryption?

A

Encryption is a mechanism that can be incorporated into security protocols
- The conversion into a form is called a ciphertext, which is not meant not to be read easily

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is Decryption?

A

The process of converting encrypted data back into its original form

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Cryptographic Techniques

A

-Encryption
-Algorithm
-Key
= The algorithm is used to transform plaintext into a ciphertext

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Classes of algorithms:

A

Reversible, symmetric (Conventional)
Reversible, asymmetric (Public key)
One-Way (Hash)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Properties of Algorithms

A

Reversible: can transform ciphertext back to plaintext
Symmetric: uses one key for both encryption and decryption
Asymmetric: uses different keys for encryption / decryption

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is Symmetric Key

A

Also called private or secret key cryptography
- The same key is used to encrypt and decrypt data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Asymmetric, Reversibile

A

Uses a key pair
- Either key can be used to encrypt a message - the other is then used to decrypt it (public and private key)
- One key is published and another is kept secret

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Symmetric vs Asymmetric Key

A

SYMMETRIC
- both share same key
- typically faster x100
ASYMMETRIC
- Two separate key: public and private key
- Typically slower

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

One-Way (Hash)

A
  • Create a message digest or “fingerprint”.
  • Plaintext message can not be deduced from its hash
  • Used for passwords by OS
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Brute Force Attack

A
  • Trying out all possible values of a password to get through.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Passwords Cracking

A

Using “password recovery” tool.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly