Midterm Flashcards

1
Q

Symmetric vs asymmetric cryptography

A

Symmetric - Same key is used to encrypt and decrypt the message
Asymmetric - Different keys are used to encrypt and decryption

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Caesar cipher - other names

A

Shift cipher and mono alphabetic cipher

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Mini alphabetical vs multi alphabetic cipher

A
Same shift (number of words and direction) used for all the characters like Caesar cipher 
Multiple shits are used for each characters like +2 , +3 and +4
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Vigenere Cipher’s strength

A
  • same letter can be encrypted in different ways
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Build a string vigenere cipher

A
  • Key is as long as plaintext
  • build the key from random characters
  • don’t use the same key again and again
  • don’t use text decorations like punctuation, spaces
  • protect the key (obviously)
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

DES

A

Data description standard - process of splitting data into blocks and encrypt then transport.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Step by step process of DES

A
  1. divide the data in to 64-bit blocks and transport
  2. encrypt the transported data by 16 separation steps using 56-bit key
  3. scrambled using swapping algorithm
  4. transport
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Public Key Encryption depends on ?

A

large prime numbers , factoring and number theory

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Find the intermediate number for symmetric key (private key)

A
  1. ia = g to the power of ka MOD p

ib = g to the power of kb MOD p

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Find the symmetric key for Alice and Bob

A

Alice
k = ib to the power of ka MOD p

Bob
k = ia to the power of kb MOD p

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Acceptable Cryptographic hash functions

A

SHA256 or SHA512
RipeMD and WHIRLPOOL
(don’t use SHA1 and MD5)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

what should be the appropriate length for a SALT ?

A

same size as the output of the hash function

for eg. SHA256 hash output 256 bits (32 byte) so the hash should be 256 bits too

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Hashing on server vs hashing on client and problems of hashing on client’s end

A

disabled javascript, man in the middle, stolen hash dataabase to authenticate

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Is it okay if I send SALT to the client to hash the username ?

A

No. Use the domain name as hash in the client side, anyway you going to hash the username in the server side too.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Name 2 DOS attack tools available online

A

TKN and TKN2k

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

how to avoid DOS attacks ?

A
  1. Micro blocks - allocate small amount of resources during the SYN + ACK stage.
  2. SYN cookie - sent cookie with all the client info plus allocate resources only when the client confirms it (takes lot of resources, not recommended)
  3. RST cookies - send wrong data to the client, if the client replies with the error then it’s legitimate else close the connection