Lecture 2 - Secret Key Encryption Flashcards

1
Q

What does hashing provide?

A

Integrity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Digital certs or PKIs provide what?

A

Authentication

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Asymmetric encryption provides what?

A

Key exchange

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Symmetric encryption provides what?

A

Confidentiality

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

E-voting, or crypto is meant to provide what?

A

Anonymity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Secret key encryption is also known as symmetric encryption. What does this mean?

A

Symmetric encryption uses the same key for encryption & decryption

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Public key encryption is known as asymmetric encryption. What does this mean?

A

Asymmetric encryption uses different keys (public & private) for encryption and decryption

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

List some characteristics of symmetric encryption?

A
  1. Uses the same key
  2. Extremely fast
  3. Uses smaller keys
  4. Key exchange is a problem
  5. Only offers confidentiality
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

List some characteristics of asymmetric encryption?

A
  1. Use different key (public / private)
  2. Relatively slow
  3. Bigger keys
  4. Good at key exchange
  5. Offers confidentiality and authentication
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

3-DES, RC4, RC5, AES are examples of what type of encryption

A

Symmetric encryption

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

DH, RSA, EIGamal, DSA are examples of what type of encryption

A

Asymmetric encryption

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is the Diffie-Hellman key exchange?

A

The Diffie-Hellman key exchange was the first widely used method of safely developing and exchanging keys over an insecure channel.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is a one-way function in cryptography?

A

It is easy to compute, but hard to invert.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is a prime number

A

A prime number is one that is divisible by itself and 1 only

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Be able to write out the Diffie-Helman two step algorithm

A

A = Gx mod (p)
B = Gy mod (p)

Bob shared key = Bx mod (p)
Alice shared key = Ax mod (p)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Encryption can be categorised as ______ and ______ based

A

Encryption can be categorised as Stream and Block based

17
Q

List two examples of Stream Based encryption

A

RC4 and ChaCha

18
Q

List some examples of Block Based encryption

A

RC2, RC5, DES, AES, Blowfish

19
Q

In terms of key sizes and attacks, what is the main weakness against ciphers?

A

Brute forcing keys is the main weakness against most ciphers

20
Q

In terms of “Key Management”, list three methods to share keys

A
  1. Offline distribution such as snail mail
  2. Public key encryption
  3. Diffie Helman
21
Q

In terms of symmetric ciphers, what is the block size and key size for AES

A
  1. Block size = 128
  2. Key size = 128,192,256
22
Q

In terms of symmetric ciphers, what is the block size and key size for DES

A
  1. Block size = 64
  2. Key size = 56
23
Q

In terms of symmetric ciphers, what is the block size and key size for 3DES

A
  1. Block size = 64
  2. Key size = 112 or 168