Lesson 5: Summarizing Basic Cryptographic Concepts Flashcards

1
Q

A hospital must balance the need to keep patient privacy information secure and the desire to analyze the contents of patient records for a scientific study. What cryptographic technology can best support the hospital’s needs?

A. Blockchain
B. Quantum computing
C. Perfect forward security (PFS)
D. Homomorphic encryption

A

D

Homomorphic encryption is used to share privacy-sensitive data sets. It allows a recipient to perform statistical calculations on data fields, while keeping the data set as a whole encrypted, thus preserving patient privacy.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

A system administrator downloads and installs software from a vendor website. Soon after installing the software, the administrator’s computer is taken over remotely. After closer investigation, the software package was modified, probably while it was downloading. What action could have prevented this incident from occurring?

A. Validate the software using a checksum
B. Validate the software using a private certificate
C. Validate the software using a key signing key
D. Validate the software using Kerberos

A

A

The administrator should have validated the software with a checksum, which uses a cryptographic algorithm to generate a unique hash value based on the file contents. If the file is changed, the checksum of the modified file will not match the original.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Which of the following utilizes both symmetric and asymmetric encryption?

A. Digital envelope
B. Digital certificate
C. Digital evidence
D. Digital signature

A

A

A digital envelope is a type of key exchange system that utilizes symmetric encryption for speed and asymmetric encryption for convenience and security.

A digital certificate is an electronic document that associates credentials with a public key. This only involves asymmetric encryption.

Digital evidence or Electronically Stored Information (ESI) is evidence that cannot be seen with the naked eye; rather, it must be interpreted using a machine or process. There is no encryption involved.

A digital signature is a message digest encrypted with a user’s private key. It uses only asymmetric encryption to prove the identity of the sender of a message and to show a message has not been tampered with.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

During a penetration test, an adversary operator sends an encrypted message embedded in an attached image. Analyze the scenario to determine what security principles the operator is relying on to hide the message.
(Select all that apply.)

A. Security by obscurity
B. Integrity
C. Prepending
D. Confidentiality

A

A, D

When used to conceal information, steganography amounts to “security by obscurity,” which is usually deprecated.

A message can be encrypted by some mechanism before embedding it in a covertext, providing confidentiality.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Examine each statement and determine which most accurately describes a major limitation of quantum computing technology.

A. Presently, quantum computers do not have the capacity to run useful applications.

B. Quantum computing is not yet sufficiently secure to run current cryptographic ciphers.

C. Quantum computing is not sufficiently agile to update the range of security products it most frequently uses.

D. Attackers may exploit a crucial vulnerability in quantum computing to covertly exfiltrate data.

A

A

Presently, the most powerful quantum computers have about 50 qubits. A quantum computer will need about a million qubits to run useful applications.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

A security technician needs to transfer a large file to another user in a data center. Which statement best illustrates what type of encryption the technician should use to perform the task?

A. The technician should use symmetric encryption for authentication and data transfer.

B. The technician should use asymmetric encryption to verify the data center user’s identity and agree on a symmetric encryption algorithm for the data transfer.

C. The technician should use asymmetric encryption for authentication and data transfer.

D. The technician should use symmetric encryption to verify the data center user’s identity and agree on an asymmetric encryption algorithm for the data transfer.

A

B

Asymmetric encryption is used for authentication, non-repudiation, and key agreement and exchange. Symmetric encryption is more efficient for bulk encryption of large amounts of data for transfer.

Symmetric encryption is very fast and used for bulk encryption of large amounts of data. Symmetric encryption cannot be used for authentication or integrity, because both parties know the same key.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

An employee works on a small team that shares critical information about the company’s network. When sending emails that have this information, what would be used to provide the identity of the sender and prove that the information has not been tampered with?

A. Private key
B. Digital signature
C. Public key
D. RSA algorithm

A

B

A digital signature proves the identity of the sender of a message and to show that a message has not been tampered with since the sender posted it. This provides authentication, integrity, and non-repudiation.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Which of the following is NOT a use of cryptography?

A. Non-repudiation
B. Obfuscation
C. Security through obscurity
D. Resiliency

A

C

Security through obscurity involves keeping something a secret by hiding it. With cryptography, messages do not need to be hidden since they are not understandable unless decrypted.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Which two cryptographic functions can be combined to authenticate a sender and prove the integrity of a message?

A. Hashing and symmetric encryption
B. Public key cryptography and digital enveloping
C. Hashing and digital enveloping
D. Public key cryptography and hashing

A

D

Public key cryptography (public and private keys) can be used to authenticate a sender. Combine this with a hash output of the message and a secret (or private) key to create a message authentication code (MAC) to validate the integrity of the message.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

A client contacts a server for a data transfer. Instead of requesting TLS1.3 authentication, the client claims legacy systems require the use of SSL. What type of attack might a data transfer using this protocol facilitate?

A. Credential harvesting
B. Key stretching
C. Phishing
D. Man-in-the-middle

A

D

A downgrade attack can be used to facilitate a man-in-the-middle attack by requesting that the server use a lower specification protocol with weaker ciphers and key lengths, making it easier for a malicious actor to forge the trusted certificate authority’s signature.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Evaluate the differences between stream and block ciphers and select the true statement.

A. A block cipher is suitable for communication applications.

B. A stream cipher is subjected to complex transposition and substitution operations, based on the value of the key used.

C. A block cipher is padded to the correct size if there is not enough data in the plaintext.

D. A stream cipher’s plaintext is divided into equal-sized blocks.

A

C

In a block cipher, if there is not enough data in the plaintext, it’s padded to the correct size. Padding is not an issue with streaming, where each byte or bit of data in the plaintext is encrypted one at a time, but it is problematic in dealing with block size.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Which of the following statements best describes the trade-off when considering which type of encryption cipher to use?

A. Asymmetric encryption is the strongest hashing algorithm, which produces longer and more secure digests than symmetric encryption.

B. Asymmetric encryption requires substantially more overhead computing power than symmetric encryption. Asymmetric encryption is inefficient when transferring or encrypting large amounts of data.

C. Symmetric encryption requires substantially more overhead computing power than asymmetric encryption. Symmetric encryption is inefficient when transferring or encrypting large amounts of data.

D. Symmetric encryption is not considered as safe as asymmetric encryption, but it might be required for compatibility between security products.

A

B

Asymmetric encryption involves substantially more computing overhead than symmetric encryption. Asymmetric encryption is inefficient when encrypting a large amount of data on a disk or transporting it over a network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Which statement describes the mechanism by which encryption algorithms help protect against birthday attacks?

A. Encryption algorithms utilize key stretching.

B. Encryption algorithms use secure authentication of public keys.

C. Encryption algorithms add salt when computing password hashes.

D. Encryption algorithms must utilize a blockchain.

A

C

A salt is an additional value stored with the hashed data field. The purpose of salt is to frustrate attempts to crack the hashes of passwords in this case. This will protect against birthday attacks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

An attacker uses a cryptographic technology to create a covert message channel in transmission control protocol (TCP) packet data fields. What cryptographic technique does this attack strategy employ?

A. Homomorphic encryption
B. Blockchain
C. Steganography
D. Key stretching

A

C

Steganography obscures the presence of a message and can be used to encode messages within TCP packet data fields to create a covert message channel for data exfiltration.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Which statement best illustrates the importance of a strong true random number generator (TRNG) or pseudo-random number generator (PRNG) in a cryptographic implementation?

A. A weak number generator leads to many published keys sharing a common factor.

B. A weak number generator creates numbers that are never reused.

C. A strong number generator creates numbers that are never reused.

D. A strong number generator adds salt to encryption values.

A

A

A cryptanalyst can test for the presence of common factors and derive the whole key much more easily. The TRNG or PRNG module in the cryptographic implementation is critical to its strength.

Predictability is a weakness in either the cipher operation or within particular key values that make a ciphertext more vulnerable to cryptanalysis. Reuse of the same key within the same session can cause this weakness.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

When using a digital envelope to exchange key information, the use of what key agreement mitigates the risk inherent in the Rivest–Shamir–Adleman (RSA) algorithm, and by what means?

A. Perfect forward secrecy (PFS) uses Diffie-Hellman (DH) key agreement to create ephemeral session keys without using the server’s private key.

B. The Cipher Block Chaining (CBC) key agreement mode uses an initialization vector (IV) to create ephemeral session keys without using the server’s private key.

C. Counter mode in key agreement makes the advanced encryption standard (AES) algorithm work as a stream cipher, by applying an initialization vector to issue a security certificate.

D. A certificate authority (CA) validates the public key’s owner and creates an initialization vector to protect the exchange from snooping.

A

A

Perfect forward secrecy (PFS) mitigates the risk from RSA key exchange, using Diffie-Hellman (DH) key agreement to create ephemeral session keys without using the server’s private key.

17
Q

Which statement best describes key differences between symmetric and asymmetric cryptographic ciphers?

A. Symmetric encryption is used for confidentiality, and uses the same key for encryption and decryption.

B. Asymmetric encryption is primarily used for confidentiality, and uses different keys for encryption and decryption.

C. Symmetric encryption is used for authentication, and is the most efficient method of encryption for large data transfers.

D. Asymmetric encryption is used for non-repudiation and is the most efficient method of encryption for large data transfers.

A

A

Symmetric encryption is used for confidentiality. Symmetric encryption is very fast and useful for bulk encryption of large amounts of data. Symmetric encryption cannot be used for authentication or integrity because both parties know the same key.

Asymmetric encryption uses two different but related public and private keys to perform operations. Asymmetric encryption can be used to prove identity, authentication, non-repudiation, and key agreement and exchange.

Symmetric encryption is very fast and useful for bulk encryption of large amounts of data. Symmetric encryption cannot be used for authentication or integrity, because both parties know the same key.

Asymmetric encryption involves substantial computing overhead compared to symmetric encryption. Asymmetric encryption is inefficient for encrypting or transporting large amounts of data.

18
Q

Compare and contrast the modes of operation for block ciphers. Which of the following statements is true?

A. ECB and CBC modes allow block ciphers to behave like stream ciphers.

B. CTM mode allows block ciphers to behave like stream ciphers.

C. ECB allows block ciphers to behave like stream ciphers.

D. CBC and CTM modes allow block ciphers to behave like stream ciphers.

A

B

Counter Mode (CTM) combines each block with a counter value. This allows each block to be processed individually and in parallel, improving performance.

Electronic Code Book (ECB) mode applies the same key to each plaintext block, which means identical plaintext blocks can output identical ciphertexts. This is not how a stream cipher behaves.

Counter Mode (CTM) allows block ciphers to behave like stream ciphers, which are faster than block ciphers.

Cipher Block Chaining (CBC) mode applies an Initialization Vector (IV) to the first plaintext block to ensure that the key produces a unique ciphertext from any given plaintext and repeating as a “chain.” This is not how a stream cipher behaves.

19
Q

Which statement most accurately describes the mechanisms by which blockchain ensures information integrity and availability?

A. Blockchain ensures availability by cryptographically linking blocks of information, and integrity through decentralization.

B. Blockchain ensures availability through decentralization, and integrity through cryptographic hashing and timestamping.

C. Blockchain ensures availability through cryptographic hashing and timestamping, and integrity through decentralization.

D. Blockchain ensures both availability and integrity through decentralization and peer-to-peer (P2P) networking.

A

B

The blockchain ledger is decentralized and distributed across a peer-to-peer (P2P) network to mitigate the risks of a single point of failure or compromise. Each block in a blockchain validates the hash of the previous block, all the way through to the beginning of the chain, ensuring that each historical transaction has not been tampered with.

Blockchain is open. It may ensure the integrity and transparency of financial transactions, among other potential applications.

Each block typically includes a timestamp of transactions, as well as the data involved in the transactions themselves, helping ensure data integrity.

One of the most important characteristics of a blockchain is decentralization. Being distributed across a peer-to-peer (P2P) network, blockchain users can trust each other equally.

20
Q

A security team is in the process of selecting a cryptographic suite for their company. Analyze cryptographic implementations and determine which of the following performance factors is most critical to this selection process if users primarily access systems on mobile devices.

A. Speed
B. Latency
C. Computational overhead
D. Cost

A

C

Some technologies or ciphers configured with longer keys require more processing cycles and memory space, which makes them slower and consume more power. This makes them unsuitable for handheld devices and embedded systems that work on battery power.

Speed is most impactful when processing large amounts of data.

For some use cases, the time required to obtain a result is more important than a data rate. Latency issues may negatively affect performance when an operation or application times out before the authentication handshake.

Cost issues may arise in any decision-making process, but for mobile device cryptography, computing overhead is a primary limiting factor.