M2: Cryptographic building blocks - C2 Flashcards

1
Q

What is encryption?

A

Turning readable data into a secret code to keep it safe.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is decryption?

A

Turning the secret code back into readable data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is symmetric-key encryption?

A

Using the same key to both encrypt and decrypt data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is public-key encryption?

A

Using a public key to encrypt data and a private key to decrypt it.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is a digital signature?

A

A unique tag added to a message to verify the sender’s identity.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is a cryptographic hash function?

A

A function that converts data into a fixed-size string of characters which appears random.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is message authentication?

A

Ensuring that a message comes from a legitimate source and hasn’t been altered.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is authenticated encryption?

A

Combining encryption and authentication to protect data confidentiality and integrity.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is a certificate?

A

A digital document that verifies the ownership of a public key.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is the Vernam cipher?

A

An encryption method using a key as long as the message known for being unbreakable if used correctly.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is a one-time pad?

A

A type of Vernam cipher where the key is used only once and is as long as the message.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is a block cipher?

A

An encryption method that processes data in fixed-size blocks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is a stream cipher?

A

An encryption method that processes data one bit or byte at a time.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is the Advanced Encryption Standard (AES)?

A

A widely used block cipher for securing data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is the Caesar cipher?

A

An ancient encryption technique that shifts letters by a fixed number of places.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is exhaustive key search?

A

Trying all possible keys until the correct one is found.

17
Q

What is a passive adversary?

A

An attacker who only observes and records data without altering it.

18
Q

What is an active adversary?

A

An attacker who can alter data or inject new data into the communication.

19
Q

What is a known-plaintext attack?

A

An attack where the adversary has access to both the plaintext and its ciphertext.

20
Q

What is a chosen-plaintext attack?

A

An attack where the adversary can choose the plaintext and see the resulting ciphertext.

21
Q

What is a chosen-ciphertext attack?

A

An attack where the adversary can choose the ciphertext and see the resulting plaintext.

22
Q

What is the Electronic Codebook (ECB) mode?

A

A block cipher mode where each block is encrypted independently.

23
Q

What is the Cipher Block Chaining (CBC) mode?

A

A block cipher mode where each block of plaintext is XORed with the previous ciphertext block before being encrypted.

24
Q

What is the Counter (CTR) mode?

A

A block cipher mode that turns a block cipher into a stream cipher by encrypting a counter value.

25
Q

What is a hybrid encryption?

A

Using public-key encryption to share a symmetric key which is then used for encrypting the actual message.

26
Q

What is RSA encryption?

A

A public-key encryption method based on the difficulty of factoring large numbers.

27
Q

What is data origin authentication?

A

Verifying who sent a message.

28
Q

What is data integrity?

A

Ensuring that data has not been altered.

29
Q

What is non-repudiation?

A

Ensuring that a sender cannot deny sending a message.

30
Q

What is a collision in hash functions?

A

When two different inputs produce the same hash value.