LP - Practical Cryptography Flashcards

Practical Cryptography

1
Q

Symmetric key encrypting uses the same

A

key to encrypt and decrypt

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Popular symmetric key encryption are

A

AES-CBC-129/256 and AES-GCM-128/256

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Symmetric encryption two types of ciphers

A
  • block
  • stream
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Some common block ciphers are

A

DES
3DES-EDE
AES-CBC
AES-GCM
Blowfish

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Stream ciphers work in plain stream bits and are

A

XORed

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Some common stream ciphers are

A

FISH
CryptMT
Scream
Cryptographic hashing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

PKI stands for

A

public key infrastructure

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Asymmetric Keys are slower or faster than symmetric keys

A

slower

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Popular Asymetric (Public Key) algorithms are

A

RSA (Rivest-Sharmir-Adleman) most widely used
Diffie-Hellman
ECC (Elliptic curve cryptography)
DSA (Digital signature algorithm

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Diffie-Hellman key exchange is a protocol for securely exchanging cryptographic keys over an

A

untrusted network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

FDE stands for

A

full disk encryption

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

In full disk encryption (FDE)

A

the master boot record (MBR) is not encrypted

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Cryptographic Hashing is a one-way mathematical function that produces a digest of length?

A

128 to 512 bit

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Cryptographic Hashing converts data of any input size to a fixed-length string called a

A
  • hash value
  • message digest
  • fingerprint
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Cryptographic hashing is an advanced version of a simple

A

checksum

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Cryptographic hashing is subject to the

A

birthday paradox and avalanche effect

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Because of the birthday paradox a cryptographic hash is only half as strong as its

18
Q

The avalanche effect is

A

if even one bit is flipped in the origin data the fixed-length hash will be completely different, like an avalanche.

19
Q

Cryptographic hashing must be collision resistance therefor we do not use

20
Q

Salting is the technique of

A

adding pseudorandom data to a cryptographic hash function

21
Q

HMACs stands for

A

Hash-based Message Authentication Codes

22
Q

Diffie-Hellman is found in

A

SSH2, TLS and IPSec

23
Q

Diffie-Hellman key exchange (DHKE) and RSA key transport are used for

A

establishing secret keys between two parties over an unsecured channel

24
Q

How does Diffie-Hellman (DH) use the secret key?

A

Both parties use it all of the time

25
How does Ephemeral Diffie-Hellman (DHE/EDH) use the secret key?
Bothe parties use the same key but it changes between uses.
26
How does Elliptic Curve Diffie-Hellman (ECDH) use the secret key?
has a public/private key pair but use the key pair every time
27
Elliptic Curve Diffie-Hellman (ECDH) is good for devices like IoT with Limited
Memory and processing power
28
Elliptic Curve Diffie-Hellman (ECDH) is commonly used in
Key exchang, IPSec and TLS, Digital signatures
29
Digital Signatures commonly use what for the hashing
SHA1/2/3
30
Digital Signatures use for the signing or encryption
RSA (Rivest-Shar-Aldeman) Digital Signature Algorithm (DSA) Elliptic Curve Digital Signature Algorithm (ECDSA)
31
Digital certificates use the standard
X.509v3
32
PKI stands for
Public Key Infrastructure
33
CRL stands for
certificate revocation list
34
OCSP stands for
Online Certificate Status Protocol
35
TPM stands for
Trusted Platform Module
36
TPM (trusted platform module) is a
trusted place to store a certificate
37
HSMs stand for
Hardare Security Modules
38
What do HSMs do?
managing. processing, generating nad storing keys verifying digital certificates SSL connection accelerator encrypting sensitive data verifying the integration of stored data
39
What does a secure enclave do?
It delivers CPU hardware-level isolation and memory encryption on a server, etc.
40
What is steganography?
Is the process of hiding a secret message inside of something that is not secret.