P2L5 Intro to Cryptography Flashcards

1
Q

avalanche effect

A

Small change causes large consequences. Contextualized in hashing algorithms. Knowing one password for one hash means little when trying to determine hash of very similar password.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

block cipher

A

Take input of text blocks of plain text of fixed size blocks and produces blocks of cipher text of equal size

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

DES vs AES

A

different block sizes and key lengths

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

a method where a specific known plaintext is compared to its ciphertext

A

known plain text attack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

a method where attacker compares ciphertexts with its known plain text (he is choosing plaintext randomly)

A

chosen plain text attack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

attack in which attacker analyzes effect of changes in input on encrypted output

A

differential analysis

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

method to determine the encryption function by analyzing known phrases and their encryption

A

linear cryptanalysis

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

in RSA, the public key encryption or decryption?

A

both

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

asymmetric encryption strengths vs symmetric

A

scalability and distribution of session keys

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

solution to knowing that public key received is from real entity and not forgery

A

public key certificate

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

public key certificate

A

signed with CA’s private key, includes period of validity, public key of the issuing party

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

how to validate public key cert

A
  1. certificate data is hashed
  2. hash is signed with private key of CA and appended to cert
  3. receiving party verifies cert by hashing the cleartext portion of the cert. Then recipient uses the CA’s public key to decrypt/verify signature of CA. If values match, then all is well.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

digital envelopes encapsulate what?

A

It contains a symmetric key encrypted with the recipient’s public key. It an encrypted message which can only be decrypted with the symmetric key.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

inputs into encryption algorithm:

A

key and plaintext

How well did you know this?
1
Not at all
2
3
4
5
Perfectly