Module 6 Flashcards
What is cryptography?
The practice of transforming information so that it is secure and cannot be understood by unauthorized persons.
What is encryption? What are the 3 different types of encryption text?
- The process of changing plaintext into ciphertext. (reverse process is decryption)
- Plaintext: Unencrypted data that is input for encryption or is the output of decryption
- Ciphertext: scrambled and unreadable output of encryption.
- Unencrypted data that is not intended to be encrypted
List some examples of different categories of ciphers:
Substitution cipher, XOR cipher
What are some of the protections that cryptography can provide? (hint 5)
- Confidentiality
- Integrity
- Authentication
- Nonrepudiation: Proving that a user performed an action
- Obfuscation: Making something obscure or unclear
What are the three states that data can be in that cryptography provides protection to?
- Data in processing (data in use): ex printing or using data
- Data in transit (data in motion): ex email sent across internet
- Data at rest: stored on electronic media
What is a resource vs security constraint?
- A limitation in providing strong cryptography due to the “tug-of-war” between the available resources (time and energy) and the security provided by cryptography.
- Ideally crpytography should have low latency
Cryptography must have ____________, or the ability to quickly recover from these constraints.
High resilience
What is lightweight cryptography?
A category of cryptography that has fewer features and is less robust than normal cryptography.
Name two different cipher variations that can sometimes be used in cryptography:
- Stream cipher: An algorithm that takes one character and replaces it with one character
- Block cipher: A cipher that manipulates an entire block of plaintext at one time.
(Whereas a stream cipher works on one character at a time, a block cipher manipulates an entire block of plaintext at one time.)
What is a hash algorithm?
- An algorithm that creates a unique digital fingerprint.
- Intended to be a one-way cipher that can’t be reversed
What are the 4 characteristics that make a hashing algorithm secure?
- Fixed size
- Unique
- Original
- Secure
List 3 common hash algorithms:
- Message Digest (MD)
- Secure Hash Algorithm (SHA)
- RIPEMD. RIPEMD stands for RACE Integrity Primitives Evaluation Message Digest
What are symmetric cryptographic algorithms?
- Encryption that uses a single key to encrypt and decrypt a message.
- Key must be kept private (also called private key cryptography)
List some common symmetric cryptographic algorithms:
- Data encryption standard (DES): Adopted by US Gov
- Triple Data Encryption Standard (3DES): Designed to replace DES
- Advanced Encryption Standard (AES): symmetric algorithm that performs three steps on every block (128 bits) of plaintext.
- Rivest Cipher (RC): family of six algorithms
- Blowfish: block cipher algorithm that operates on 64-bit blocks and can have a key length from 32 to 448 bits.
What is the primary weakness of symmetric encryption algorithms?
distributing and maintaining a secure single key among multiple users, who are often scattered geographically, poses significant challenges.