LP - Practical Cryptography Flashcards

Practical Cryptography

1
Q

Symmetric key encrypting uses the same

A

key to encrypt and decrypt

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Popular symmetric key encryption are

A

AES-CBC-129/256 and AES-GCM-128/256

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Symmetric encryption two types of ciphers

A
  • block
  • stream
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Some common block ciphers are

A

DES
3DES-EDE
AES-CBC
AES-GCM
Blowfish

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Stream ciphers work in plain stream bits and are

A

XORed

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Some common stream ciphers are

A

FISH
CryptMT
Scream
Cryptographic hashing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

PKI stands for

A

public key infrastructure

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Asymmetric Keys are slower or faster than symmetric keys

A

slower

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Popular Asymetric (Public Key) algorithms are

A

RSA (Rivest-Sharmir-Adleman) most widely used
Diffie-Hellman
ECC (Elliptic curve cryptography)
DSA (Digital signature algorithm

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Diffie-Hellman key exchange is a protocol for securely exchanging cryptographic keys over an

A

untrusted network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

FDE stands for

A

full disk encryption

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

In full disk encryption (FDE)

A

the master boot record (MBR) is not encrypted

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Cryptographic Hashing is a one-way mathematical function that produces a digest of length?

A

128 to 512 bit

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Cryptographic Hashing converts data of any input size to a fixed-length string called a

A
  • hash value
  • message digest
  • fingerprint
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Cryptographic hashing is an advanced version of a simple

A

checksum

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Cryptographic hashing is subject to the

A

birthday paradox and avalanche effect

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Because of the birthday paradox a cryptographic hash is only half as strong as its

18
Q

The avalanche effect is

A

if even one bit is flipped in the origin data the fixed-length hash will be completely different, like an avalanche.

19
Q

Cryptographic hashing must be collision resistance therefor we do not use

20
Q

Salting is the technique of

A

adding pseudorandom data to a cryptographic hash function

21
Q

HMACs stands for

A

Hash-based Message Authentication Codes

22
Q

Diffie-Hellman is found in

A

SSH2, TLS and IPSec

23
Q

Diffie-Hellman key exchange (DHKE) and RSA key transport are used for

A

establishing secret keys between two parties over an unsecured channel

24
Q

How does Diffie-Hellman (DH) use the secret key?

A

Both parties use it all of the time

25
Q

How does Ephemeral Diffie-Hellman (DHE/EDH) use the secret key?

A

Bothe parties use the same key but it changes between uses.

26
Q

How does Elliptic Curve Diffie-Hellman (ECDH) use the secret key?

A

has a public/private key pair but use the key pair every time

27
Q

Elliptic Curve Diffie-Hellman (ECDH) is good for devices like IoT with Limited

A

Memory and processing power

28
Q

Elliptic Curve Diffie-Hellman (ECDH) is commonly used in

A

Key exchang, IPSec and TLS, Digital signatures

29
Q

Digital Signatures commonly use what for the hashing

30
Q

Digital Signatures use for the signing or encryption

A

RSA (Rivest-Shar-Aldeman)
Digital Signature Algorithm (DSA)
Elliptic Curve Digital Signature Algorithm (ECDSA)

31
Q

Digital certificates use the standard

32
Q

PKI stands for

A

Public Key Infrastructure

33
Q

CRL stands for

A

certificate revocation list

34
Q

OCSP stands for

A

Online Certificate Status Protocol

35
Q

TPM stands for

A

Trusted Platform Module

36
Q

TPM (trusted platform module) is a

A

trusted place to store a certificate

37
Q

HSMs stand for

A

Hardare Security Modules

38
Q

What do HSMs do?

A

managing. processing, generating nad storing keys
verifying digital certificates
SSL connection accelerator
encrypting sensitive data
verifying the integration of stored data

39
Q

What does a sewcure enclave do?

A

It delivers CPU hardware-level isolation and memory encryption on a server, etc.

40
Q

What is steganography?

A

Is the process of hiding a secret message inside of something that is not secret.