Module 2 Cryptography Flashcards

1
Q

What is Symmetric Cryptography?

A

Overview: encryption method using the same key for encryption and decryption.

Simplified Breakdown: Both parties share a single secret key.

Example: AES (Advanced Encryption Standard) is used for securing data at rest.

Key Points:
Fast and efficient.
Requires secure key sharing.
Suitable for bulk data encryption.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is Asymmetric Cryptography?

A

Overview: Uses a public key for encryption and a private key for decryption.

Simplified Breakdown: The public key is shared openly; the private key is kept secret.

Example: RSA for secure email transmission.

Key Points:
Supports secure key exchange.
Enables digital signatures.
Slower than symmetric cryptography.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is PKI (Public Key Infrastructure)?

A

Overview: Framework managing public and private keys for encryption.

Simplified Breakdown: Uses digital certificates to verify identities.

Example: SSL/TLS certificates for secure websites.

Key Points:
Supports secure communication.
Enables digital signatures.
Relies on Certificate Authorities (CAs).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is Hashing?

A

Overview: Converts data into a fixed-size hash value.
Simplified Breakdown: One-way function; can’t reverse to get original data.
Example: SHA-256 is used in password hashing and blockchain.
Key Points:
Ensures data integrity.
Not used for encryption/decryption.
Collision-resistant.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is MAC (Message Authentication Code)?

A

Overview: Ensures data integrity and authenticity.

Simplified Breakdown: Adds a tag to data using a secret key.

Example: HMAC (Hash-based MAC) in API authentication.

Key Points:
Detects tampering.
Requires a shared secret key.
Often used with symmetric encryption.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is Encryption Algorithms?

A

Overview: Mathematical processes for securing data.

Simplified Breakdown: Converts plaintext to ciphertext.

Examples: AES (symmetric), RSA (asymmetric), ECC (asymmetric).

Key Points:
Symmetric for speed and bulk data.
Asymmetric for secure key exchange.
Strength depends on key size.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is ECC (Elliptic Curve Cryptography)?

A

Overview: Asymmetric encryption using elliptic curves.

Simplified Breakdown: Provides strong encryption with smaller keys.

Example: Used in secure mobile communications.

Key Points:
Lightweight and efficient.
Good for devices with limited processing power.
Vulnerable to quantum computing threats.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Stream vs. Block Ciphers

A

Stream Cipher: Encrypts data bit-by-bit (e.g., RC4).

Block Cipher: Encrypts data in fixed-size blocks (e.g., AES).

Key Differences:
Stream ciphers are fast and suitable for real-time data.
Block ciphers provide better integrity and security.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What are Certificates (Digital Certificates)?

A

Explanation: Digital certificates are used to verify the identity of entities in a network, ensuring secure communication.

Simplified Breakdown: It’s like an ID card for websites or email, proving that the person or website you’re communicating with is legitimate.

Real-World Examples:
HTTPS certificates on websites.
Email certificates for encrypted communications.

Key Points:
They contain public keys and information about the owner.
Issued by trusted Certificate Authorities (CAs).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is X.509 Standard?

A

Explanation: X.509 is a standard for public key certificates, defining how digital certificates should be structured.

Simplified Breakdown: It’s a rulebook for creating and using certificates that help prove identity in online communications.

Real-World Examples:
SSL/TLS certificates for secure websites.
Certificates used in email encryption (S/MIME).

Key Points:
Includes details like the certificate holder, the issuer, and expiration date.
Used in many security protocols for encryption and authentication.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is Web of Trust?

A

Explanation: A decentralized model for verifying the authenticity of digital certificates through mutual trust among individuals.

Simplified Breakdown: Instead of relying on a central authority, individuals vouch for each other’s digital certificates.

Real-World Examples:
PGP encryption for email, where users sign each other’s keys to build trust.

Key Points:
Often used in email encryption and personal communications.
Less centralized compared to Certificate Authorities.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is Hash Collision?

A

Explanation: A hash collision occurs when two different pieces of data produce the same hash value.

Simplified Breakdown: It’s like two different documents having the same fingerprint, which should be impossible for a good hash function.

Real-World Examples:
Attacks on older hash functions like MD5 or SHA-1, where collisions can be exploited.

Key Points:
Collisions make a hash function vulnerable to attacks.
Modern algorithms like SHA-256 are designed to minimize collisions.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is Salting Passwords?

A

Explanation: Salting is the process of adding random data (a salt) to passwords before hashing them to make them more secure.

Simplified Breakdown: Imagine adding a unique twist to each password before converting it into a hash to make it harder to crack.

Real-World Examples:
Storing passwords securely in databases (e.g., bcrypt or Argon2).

Key Points:
Protects against rainbow table attacks.
Ensures that even identical passwords have unique hashes.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is Secure Shell (SSH)?

A

Explanation: SSH is a network protocol used for secure communication between computers, especially for remote administration.

Simplified Breakdown: It’s like a secure tunnel for logging into another computer and managing it safely over a network.

Real-World Examples:
Remote access to servers for system administrators.
Secure file transfers with SCP (Secure Copy Protocol).

Key Points:
Uses encryption for confidentiality and authentication.
Commonly used for remote login and executing commands on remote servers.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is Pretty Good Privacy (PGP)?

A

Explanation: PGP is an encryption program used to secure emails and files through public key cryptography.

Simplified Breakdown: It’s like locking your email with a special key that only the recipient can unlock with their private key.

Real-World Examples:
Encrypting emails to ensure confidentiality.
Signing emails to verify authenticity.

Key Points:
Uses both asymmetric encryption (public/private keys) and hashing.
Commonly used in email security and file encryption.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

What is Digital Signatures?

A

Explanation: A mathematical scheme for verifying the authenticity and integrity of digital messages or documents.

Simplified Breakdown: Like signing a document to prove it’s really from you.

Example: Used in email verification and software distribution.

Key Points:
Involves private and public keys.
Ensures data has not been tampered with.

21
Q

What is VPN (Virtual Private Network)?

A

Explanation: A service that encrypts your internet traffic and masks your IP address.

Simplified Breakdown: It’s like creating a secure, private tunnel through the internet.

Example: Used for secure access to corporate networks remotely.

Key Points:
Masks your location.
Provides secure access over public networks.

21
Q

What is SSL/TLS?

A

Explanation: Protocols for securing communications over a computer network, ensuring privacy and integrity.

Simplified Breakdown: SSL/TLS creates a secure “tunnel” for data.

Example: HTTPS websites use SSL/TLS for secure browsing.

Key Points:
SSL is now deprecated in favor of TLS.
Ensures confidentiality and authentication.

22
Q

What is Trusted Platform Module (TPM)?

A

Explanation: A hardware-based security device used to store cryptographic keys and ensure system integrity.

Simplified Breakdown: It’s a tiny chip that protects passwords and sensitive data.

Example: TPM is used in secure boot processes and disk encryption (e.g., BitLocker).

Key Points:
Provides hardware-level security.
Protects keys, certificates, and passwords.

23
Q

What is Multi-Factor Authentication (MFA)?

A

Explanation: A security mechanism that requires two or more forms of verification to access an account or system.

Simplified Breakdown: Like needing a password and a fingerprint to unlock your phone.

Example: Used in online banking and secure logins.

Key Points:
Combines something you know, something you have, and something you are.
Enhances security by adding layers of protection.