M2: Cryptographic building blocks - C2 Flashcards
What is encryption?
M2: Cryptographic building blocks - C2
Turning readable data into a secret code to keep it safe.
What is decryption?
M2: Cryptographic building blocks - C2
Turning the secret code back into readable data.
What is symmetric-key encryption?
M2: Cryptographic building blocks - C2
Using the same key to both encrypt and decrypt data.
What is public-key encryption?
M2: Cryptographic building blocks - C2
Using a public key to encrypt data and a private key to decrypt it.
What is a digital signature?
M2: Cryptographic building blocks - C2
A unique tag added to a message to verify the sender’s identity.
What is a cryptographic hash function?
M2: Cryptographic building blocks - C2
A function that converts data into a fixed-size string of characters which appears random.
What is message authentication?
M2: Cryptographic building blocks - C2
Ensuring that a message comes from a legitimate source and hasn’t been altered.
What is authenticated encryption?
M2: Cryptographic building blocks - C2
Combining encryption and authentication to protect data confidentiality and integrity.
What is a certificate?
M2: Cryptographic building blocks - C2
A digital document that verifies the ownership of a public key.
What is the Vernam cipher?
M2: Cryptographic building blocks - C2
An encryption method using a key as long as the message known for being unbreakable if used correctly.
What is a one-time pad?
M2: Cryptographic building blocks - C2
A type of Vernam cipher where the key is used only once and is as long as the message.
What is a block cipher?
M2: Cryptographic building blocks - C2
An encryption method that processes data in fixed-size blocks.
What is a stream cipher?
M2: Cryptographic building blocks - C2
An encryption method that processes data one bit or byte at a time.
What is the Advanced Encryption Standard (AES)?
M2: Cryptographic building blocks - C2
A widely used block cipher for securing data.
What is the Caesar cipher?
M2: Cryptographic building blocks - C2
An ancient encryption technique that shifts letters by a fixed number of places.
What is exhaustive key search?
M2: Cryptographic building blocks - C2
Trying all possible keys until the correct one is found.
What is a passive adversary?
M2: Cryptographic building blocks - C2
An attacker who only observes and records data without altering it.
What is an active adversary?
M2: Cryptographic building blocks - C2
An attacker who can alter data or inject new data into the communication.
What is a known-plaintext attack?
M2: Cryptographic building blocks - C2
An attack where the adversary has access to both the plaintext and its ciphertext.
What is a chosen-plaintext attack?
M2: Cryptographic building blocks - C2
An attack where the adversary can choose the plaintext and see the resulting ciphertext.
What is a chosen-ciphertext attack?
M2: Cryptographic building blocks - C2
An attack where the adversary can choose the ciphertext and see the resulting plaintext.
What is the Electronic Codebook (ECB) mode?
M2: Cryptographic building blocks - C2
A block cipher mode where each block is encrypted independently.
What is the Cipher Block Chaining (CBC) mode?
M2: Cryptographic building blocks - C2
A block cipher mode where each block of plaintext is XORed with the previous ciphertext block before being encrypted.
What is the Counter (CTR) mode?
A block cipher mode that turns a block cipher into a stream cipher by encrypting a counter value.
What is a hybrid encryption?
M2: Cryptographic building blocks - C2
Using public-key encryption to share a symmetric key which is then used for encrypting the actual message.
What is RSA encryption?
M2: Cryptographic building blocks - C2
A public-key encryption method based on the difficulty of factoring large numbers.
What is data origin authentication?
M2: Cryptographic building blocks - C2
Verifying who sent a message.
What is data integrity?
M2: Cryptographic building blocks - C2
Ensuring that data has not been altered.
What is non-repudiation?
M2: Cryptographic building blocks - C2
Ensuring that a sender cannot deny sending a message.
What is a collision in hash functions?
M2: Cryptographic building blocks - C2
When two different inputs produce the same hash value.