Section 2: Cryptography Flashcards

1
Q

What is obfuscation?

A

Hide something to make it confidential.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Explain the Caesar Cipher

A

Substitute a letters

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is ROT2?

A

Shifted the letters along 2 places.

A becomes C

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Vigenere Cypher

A

A key is used on the plain text and then matched against a caesar cypher table. Great for the alphabet.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What are the 2 classic cryptography components?

A
  1. Algorithm

2. Key for encryption

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

XOR - Exclusive OR

A

Similar to vigenere but for binary

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is Kerckhoffs’s principle?

A

Everybody knows the algorithm but the key is secure.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is data at rest?

A

Stored media

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is data in transit?

A

Phone calls etc

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is Data in Process?

A

Data in RAM, CPU

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

How do you send an encryption key?

A

asymmetric encryption

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

In-band v out-of-band

A

Sending the key with the encrypted data, vs physically taking.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is an Ephemeral Key?

A

Temporary Key - provides perfect forward secrecy.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is asymmetric encrption?

A

Uses a key pair - public + private.

Public used to encrypt
Private used to decrypt

Slow and onerous. Great for exchanging session keys.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is a Cryptosystem?

A

Sets the rules of the system - key properties - length. Communications requirements for key exchange and the actions for encryption and decryption.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is symmetric encrption?

A

Using the same key to encrypt and decrypt.

17
Q

What is DES

A

Data Encryption Standard - a symmetric block algorithm, invented by IBM. First open standard by gov.

18
Q

How does DES work?

A
64 block
Create a key and subkey
Perform Feistel Function
Expansion function
XOR
8 S Boxes
Final permutation
19
Q

What types of block encryption replaced DES?

A

Blowfish and Triple DES.

20
Q

What 3 things are important for a block cypher?

A

Key size
Number of rounds
Block size

21
Q

What are DES stats?

A

64-bit Block size
16 Rounds
56 bit Key Size

22
Q

What are Triple DES stats?

A

64-bit Block size
16 Rounds
x3 56 bit Key Size

23
Q

What are the Blowfish stats?

A

64-bit Block size
16 Rounds
32 - 448 bit Key Size

24
Q

What is the AES? When did it come out?

A

Advanced Encryption Standard released in early 2000s. Unhackable! Supported by the NIST.

25
Q

What are AES stats?

A

128-bit Block size
10, 12 or 14 Rounds
128, 192 or 256 bit Key Size

26
Q

What is a Streaming Cypher?

A

Each bit is encrypted one by one.

27
Q

What is RC4?

A

Rivest Cipher 4
Streaming Cypher
No Blocks, 1 Round, Key Size 40 to 2048-bits