Providing Confidentiality with Encryption Flashcards

1
Q

What are the two elements that make up the encryption method?

A

1) Algorithm

2) Key

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What does the encryption key do?

A

it is a number that provides variability for the encryption

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

what is a pseudo-random number and what is it used for?

A

a number that appears to be random but is created by deterministic algorithm. It provides a nonce (number used once) for the starting value known as the Initialization Vector for a crypto algorithm used to create encryption keys

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What logical operation compares two inputs and if only one of those inputs is 1 it will output a 1 (TRUE), or if they are the same it will output binary 0 (FALSE)

A

XOR
(X = exclusive, meaning that the two input values must be either exclusively 1, or exclusively 0 for the output to be a 1)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

In encryption, confusion means what?

A

is a measure of how different the ciphertext is from the plain text

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

in encryption, small changes in the plaintext result in large changes in ciphertext is known as what?

A

diffusion

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

regarding algorithms, what to security experts discourage? Why?

A

secret algorithms that nobody else can access

without subjecting them to review, flaws can remain hidden

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

an algorithm is said to have high resilience if…

A

if the algorithm remains difficult to crack even if part of it is leaked

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Why would a stream cipher be better suited to encrypting an audio stream over the network?

A

because it is continuous in fashion, and not a fixed size. You just can’t deal with it in blocks one at a time.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Stream ciphers should never re-use what?

A

the encryption key

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is the simplest of block cipher modes and describe its basic operation.
Why is it deprecated?

A

ECB - Electronic Codebook.
It divides the data into blocks and encrypts each block with the same key
Because it uses the same key to encrypt each block it is unsafe which is why it is deprecated

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

which block cipher mode starts with IV on the first block then combines each subsequent block with the previous block using a XOR operation?

A

Cipher Block Chaining mode (CBC)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Which block cipher mode converts the blocks to a stream cipher?

A

Counter Mode (CTM/CTR)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Which block cipher mode also assures integrity using hashing and is widely used due to its efficiency to quickly encrypt and decrypt?

A

GCM - Galois/Counter Mode

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Symetric encryption is AKA?

A

secret-key or session-key

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What type of key does RADIUS use to encrypt communication between the RADIUS server and the RADIUS client (e.g. VPN concentrator)?

A

Symmetric key

17
Q

Why is asymettric encryption mostly only used for key exchange and not for the raw data itself?

A

Because it’s very resource intensive

18
Q

Certificates are used in xxx encryption. They include the xxx keys along with details on the xxx and on the xxx xxxx. If an owner wants to share a key they share a copy of the xxx

A

Certificates are used in ASYMMETRIC encryption. They include the PUBLIC keys along with details on the OWNER and on the CERTIFICATE AUTHORITY. If an owner wants to share a key they share a copy of the CERTIFICATE

19
Q

Which asymmetric encryption algorithm is widely used to protect data transmitted over the internet?
What is the key size?

A

RSA.

The key size is 2048bits

20
Q

In ephemeral key generation,, the Perfect Forward Secrecy feature indicates keys have been generated using a _____ _____ What is the goal?

A

it generates public keys using a non-deterministic algorithm. The goal is to prevent the use of the same keys being generated which could compromise data encrypted in the past

21
Q

Which cryptographic key generation technique is often used with small wireless devices

A

ECC - Elliptic Curve Cryptography

22
Q

Which version of Diffie-Hellman uses ECC to generate ephemeral keys?

A

ECDHE - Elliptic Curve Diffie-Hellman Ephemeral

23
Q

What can be used to indicate the use of steganography?

A

File hashing. If hashes of files are taken regularly, they can be compared with previous hashes to see if any files have been modified.

24
Q

what is the pseudo-random number used for the initialization vector also known as?

A

a nonce (which is a number used once)

25
Q

Which supports perfect forward secrecy for ephemeral keys, Diffie-Hellman or RSA?

A

Diffie-Hellman

26
Q

Which encryption algorithm was

a) the first public-key cryptography system
b) key generated based on the factoring of two large prime numbers that make it very hard to guess in order to obtain the private key.

A

RSA

27
Q

Which algorithm allows Diffie-Hellman key exchange to use digital signature for authentication?

A

DSA

28
Q

What is considered the successor to DSA and why is it suitable for low power devices?

A

ECDSA (Elliptic Curve DSA)
Suitable for low power devices (like mobile or IoT devices) because Elliptic Curve Cryptography is faster because it uses shorter key lengths while keeping the same level of security