Lesson 5 Flashcards

1
Q

breaking and finding a weakness in a given algorithm

A

cryptanalysis

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

private key cryptography, utilizes a single key for encryption and decryption

A

symmetric cryptography

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

public key cryptography, utilizes public and private key

A

asymmetric cryptography

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

keyless cryptography that creates a unique and fixed length hash value based on the original message, integrity check

A

hash functions

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

allows users to sign a message in order to enable detection of changes to message contents

A

digital signatures

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

created to link a public key to a particular individual

A

certificate

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

symmetric key cryptography uses these ciphers (2)

A

block and stream

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

takes a predetermined number of bits and encrypts that block

A

block cipher

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

encrypts each bit in a plaintext message, 1 by 1

A

stream cipher

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

this cipher is more commonly used, slower but more efficient, resource intensive and complex

A

block cipher

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

block cipher using a 56-bit key, no longer considered secure

A

DES (symmetric)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

uses DES to encrypt each block 3 times, operates in different modes (CBC, ECB, CFB, OFB, CTR)

A

3DES (symmetric)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

uses 3 different ciphers with 128-bit key, 192-bit key, and 256-bit key, all having a block length of 128 bits

A

AES (symmetric)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

used in SSL

A

RSA (asymmetric)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

used in SHA-2, ECDSA

A

ECC (asymmetric)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

used for encrypting messages and files, was originally symmetric

A

PGP (asymmetric)

17
Q

SHA-2, SHA-3, MD5, RACE

A

hash algorithms

18
Q

cryptography protects data in these states (2)

A

rest, motion