MODULE 2 Flashcards

1
Q

Symmetric encryption ingredients:

A
  • Plaintext
  • Encryption algorithm
  • Secret key
  • Ciphertext
  • Decryption algorithm
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Cryptanalysis types of attacks:

A
  • Ciphertext only
  • Known plaintext
  • Chosen plaintext
  • Chosen ciphertext
  • Chosen text
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Encryption is computationally secure if:

A
  • Cost of breaking cipher exceeds info value
  • Time to break cipher exceeds info useful lifetime
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Feistel cipher design features:

A
  • Block size
  • Key size
  • Number of rounds
  • Ease of analysis
  • Function
  • Fast encryption/decryption
  • Subkey generation algorithm
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

AES:

A

An encryption standard that processes a block as a matrix each round

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Design considerations for stream ciphers:

A
  • Encryption sequence must have a large period
  • Keystream approximate true random number
  • A key length of at least 128 bits is desirable
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

RC4:

A

A stream cipher with variable key size and byte-oriented operations for random permutations

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

WEP stands for _____

A

Wired Equivalent Privacy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

WPA stands for _____

A

Wi-Fi Protected Access

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

ECB stands for _____

A

Electronic Codebook

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

RC4’s practical uses:

A
  • SSL/TLS
  • WEP/WPA
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

CBC stands for _____

A

Cipher Block Chaining

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

CFB stands for _____

A

Cipher Feedback

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

CTR stands for _____

A

Counter

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

OFB stands for _____

A

Output Feedback

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Message authentication:

A

Verifying that a received message is authentic to protect against active attacks

12
Q

Block cipher modes of operation:

A
  • ECB
  • CBC
  • CFB
  • OFB
  • CTR
13
Q

Confidentiality of RSA depends on a number of factors:

A
  • Algorithm security
  • Private key security
  • Protocol security
13
Q

Aspects of authentic messages:

A
  • Contents unaltered
  • From authentic source
  • Timely and in correct sequence
13
Q

SHA-512 algorithm processing steps:

A
  1. Append padding
  2. Append length
  3. Initialize buffer
  4. Process message
  5. Output
14
Q

Hash function requirements:

A
  • Easy to compute
  • Any size input
  • Fixed-length output
  • One-way property
  • Weak collision resistance
  • Strong collision resistance
14
Q

Attack approaches against hash functions:

A
  • Cryptanalysis
  • Brute-force attack
15
Q

Timing attacks are alarming because:

A
  • Unexpected
  • Ciphertext only
16
Q

Digital signature:

A

Cryptographic transformation of data that provides origin authentication, data integrity, and signatory non-repudiation

17
Q

Requirements to qualify as random:

A
  • Randomness
  • Unpredictability