P2 T1 L12 - Encryption Flashcards

You may prefer our related Brainscape-certified flashcards:
1
Q

Define encryption (1 point)

A
  1. A way of making sure data cannot be understood if you don’t possess the means to decrypt it.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Plaintext of a message sent is encrypted using a _______ _________ and ____ into equivalent ciphertext.

When received, the ciphertext is decrypted back to plaintext using the same or different ____.

Two methods at the opposite end of the security spectrum are the ______ cipher (low security) and the _______ cipher (high security).

A

cipher algorithm

key

key

Caesar

Vernam

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Give 3 uses of encryption

A
  1. Sometimes used to store passwords.
  2. Used for sending data over a network securely.
  3. Making storage media secure, particularly portable media.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

(Caesar cipher)

The Caesar cipher is most basic type of encryption and the most insecure

Letters of the alphabet are shifted by a __________ _________.

_________ is data in human-readable form.

___________ is data that has been encrypted.

A

consistent amount

Plaintext

Ciphertext

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

(Vernam cipher)

The encryption key, also known as the ___-____ ____, is the only cipher proven to be unbreakable

The key must be: (2 points)

A

one-time pad

  1. A truly random sequence greater or equal in length than the plaintext and only ever used once.
  2. Shared with the recipient by hand, independently of the message and destroyed immediately after use.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

(The one-time pad)

The one-time pad must be truly _________, generated from a _________ and __________ phenomenon.

Sources may include: (Give 4 examples)

A truly random key will render any frequency analysis useless as it would have a _________ ___________.

Computer generated ‘random’ sequences are not actually random.

A

random

physical

unpredictable

  1. Atmospheric noise
  2. Radioactive decay
  3. Movements of a mouse
  4. Snapshots of a lava lamp

uniform distribution

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

(Different types of encryption)

Explain Symmetric methods (3 points)

A
  1. Also known as private-key cryptography,
  2. the key used to encrypt and decrypt the message must remain secure, because anyone with access to it can decrypt the data.
  3. Using this method, a sender encrypts the data with one key, sends the data (the ciphertext) and then the receiver uses the key to decrypt the data.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

(Different types of encryption)

Explain Asymmetric methods (3 points)

A
  1. Also known as public-key cryptography
  2. it uses two keys for encryption or decryption (it has the potential to be more secure as such).
  3. a public key is freely available to everyone and is used to encrypt messages, and a different, private key is used by the recipient to decrypt messages.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Hashing is NOT encryption.
Hashing can only be done one ____.

Using hashing for password protection:

  1. Password stored as ________ ______ (so, not plaintext)
  2. Login software _________, and looks for a match (or not)
  3. Gives appropriate message
A

way

hashed value
rehashes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

How are most codes cracked? (name 5 ways)

A
  1. Substitution (commonly used)
  2. Transposition (commonly used)
  3. Reverse engineering
  4. Dictionary attacks
  5. Brute force
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Explain dictionary attacks (1 point)

A
  1. After each attempt, the result is compared with the dictionary
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Explain brute force (in code cracking) (1 point)

A
  1. Looking at every single permutation and combination to see if it compares to the decrypted text.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

(Frequency analysis)

______ are not used equally often.

In English, E is by far the most common letter, followed by T, A, O, I, N, S, R, then H.

Other letters like Z, J, K, Q, X are fairly rare.

In Czech, the letter Z is only worth 4 points in Scrabble! It’s worth 10 in the English version.

A

Letters

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What makes for a strong encryption? (2 points)

A
  1. No pattern matching can be done (repeated letters, vowels)
  2. There are enough possible values that it is hard to guess
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Hash functions are ____-____ ________. This means that given the hash value it is not possible to regenerate the key that the hash function acted upon, but given the hash key it is possible to generate its hash value.

This is exploited in password protection.

A

one-way functions

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

The password associated with a user’s login account is not usually stored in ________ form inside a computer because it would be very easy for a hacker to discover where passwords are stored and to discover users’ passwords. Instead, a _____ _______ equivalent of a user’s password is stored inside a computer.

A

plaintext

hash value

17
Q

The login software is designed to hash the password submitted by a user attempting to log in.

The equivalent hash value is then compared with the user’s stored ________ __________. If the two match the login software proceeds to admit the user to the system. If the two do not match the login software warns the user of a password mismatch.

A hacker discovering passwords in hash value form inside a computer will find that this form of password representation will not be the required form of password for use in logging in.

A

hashed password