Module 03 - Criptography Flashcards
Definition:
Cryptography
The process of writing or solving messages using a secret code
Definition:
Security through obscurity
Protecting by hiding something
Definition:
Encryption
A form of cryptography, it’s a process of converting text into unintelligible text, or a ciphertext.
Definition:
Ciphertext
Encrypted text
What’s Cryptanalysis?
The art of cracking cryptographic systems
What are Encryption Keys?
String used to encrypt and decrypt messages, generated by ciphers
What kinds of encryption keys are there?
Symmetric and Assymetric
Definition:
Symmetrick algorithm
The same key that encrypts also decrypts
Definition:
Asymmetric algorithm
Uses a public key to encrypt and a private key to decrypt
Definition:
Hashing
The process of converting one value into another, no decrypting, no duplicates
Definition:
Salt [Hashing]
It’s the process of fixating a string at the end of a value before hashing it, to generate a completely different hash
What’s a Digital Signature?
Verifies that data is legitimate, non-repudiation.
Private key + Hash of data
What’s non-repudiation?
The concept of not being able to disassociate the ‘cause’ from the ‘consequence’.
Audit trails
Acronym:
ECC
Elliptic Curve Cryptography
Definition:
Elliptic Curve Cryptography - ECC
Cryptography method that generates more complex and smaller encryption keys
Definition:
Perfect Forward Secrecy
Most used in messaging apps, uses a different encryption key for each message in the same conversation
Definition:
Steganography
Technique of hiding files, messages, bytes in other files, messages or bytes
Definition:
Cipher or Encryption Algorithm
Cryptographic process that encodes and decrypts data, using encryption keys
What are the types of ciphers?
- Substitution and Transposition algorithm
- Symmetric Algorithm
- Asymmetric Algorithm
Acronym:
AES
Advances Encryption Standard
True or false:
The larger the key’s length the more memory and processing power to encrypt/decrypt
True
Definition:
Brute force cryptoanalysis
Attempt to decrypt a ciphertext with every possible key
True or false:
Symmetric algorithm is more processing consuming that Asymmetric
False
List common asymmetric algorithms
- RSA
- ECC
- DSA
- Diffie-Hellman
Acronym:
RSA
Rivest-Shamir-Adleman
Acronym:
DSA
Digital Signature Algorithm
What RSA is used in?
Mostly in creating digital signatures
What DSA is used in?
Only in creating digital signatures
What Diffie-Hellman is used in?
Security protocols such as TLS, SSH, IPSec and others
What ECC is used in?
Securing data transmission, mainly in websites
What are Hybrid Cryptosystems?
Combine the efficiency of symmetric encryption with the convenience of asymmetric encryption.
Describe the process in Hybrid Cryptosystems
Definition:
Ephemeral Keys
Encryption keys generated for each new session or message sent, used in PFC
Acronym:
PFS
Perfect Forward Secrecy
Definition:
Open Public Ledger
Distributed public record of transactions that supports the integrity of blockchains.
Definition:
Blockchain
Expanding list of transactions protected by cryptography.
Definition:
Blocks, [In blockchain]
It’s a record of a transaction.
How are the blocks linked criptographycally?
The hash value of the previous block in the chain is added to the hash calculation of the next block in the chain.
What is in a block?
- Time
- Date
- Parties involved
- A unique hash that separates the block from other blocks on the chain
What are the applications of blockchain?
Financial transactions
Legal contracts
Copyright and Intelectual property
Online voting systems
Identity Management System