Section 2.8 Basics of Cryptographic concepts Flashcards

1
Q

What do you call the conversion of machine-readable and human-readable communicated information into an unreadable form that keeps the information confidential and private?

A

Cryptography

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

The central function of cryptography is _________, the transformation of data into an unreadable form.

A

Encryption

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Encryption ensures _______ by keeping the information hidden from those for whom the information is not intended.

A

Confidentiality

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What transforms encrypted data back into an intelligible form?

A

Decryption

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Cryptography also supports ________ by making systems better able to handle resource constraints.

A

High resiliency

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Cryptographic algorithms and techniques are chosen based on?

A

The level of protection required and resource constraints

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

The number of bits that are within an encryption algorithm’s key is?

A

Key length/size

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

The set of all possible permutations of a key is the?

A

Keyspace

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Data integrity is maintained by using what cryptologic function?

A

Hashing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is often used to create signatures for files that indicate whether a file has been tampered with?

A

Hashing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What cryptologic function is used to maintain Authentication?

A

Encrypted digital certificates are used to identify users electronically on a network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

By implementing _____________ processes, a cryptographic system can be considered secure for business and legal transactions?

A

Nonrepudiation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What concept provides security by modifying the data to make it unreadable to a human or program trying to use it?

A

Obfuscation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

A system that provides encryption and decryption services is called a?

A

Cryptosystem

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

A cryptosystem uses a mathematical encryption ___________ to turn data into ciphertext?

A

Algorithm/Cipher

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

A _______ is like a password that’s combined with an algorithm to create the ciphertext.

A

key

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

The strength of an encryption key depends on the algorithm’s what?

A

keyspace

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Most attacks on encryption center on what?

A

The interception of keys

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

What concept means that the outcome of the ciphertext is dependent on several parts of the key, rather than only one? This concept increases the change in the plaintext to ciphertext.

A

Confusion

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

What concept means that even a small change in the plaintext results in a significant change in the ciphertext?

A

Diffusion

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

What type of cipher switches out the plaintext characters with other characters?

A

Substitution Cipher

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

What type of cipher rearranges the characters in different places through mathematical formulas?

A

Transposition Cipher

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

What encryption scheme has both parties using the same key to encrypt and decrypt?

A

Symmetric Encryption/Secret Key

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

The security of Symmetric Encryption depends on?

A

Users keeping their keys private

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

A symmetric systems is much faster than asymmetric encryption because what?

A

The underlying algorithms are simpler and more efficient.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

What type of symmetric encryption encrypts data one bit at a time?

A

Stream Ciphers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

What is the most commonly found streaming cipher, found in the Wired Equivalent Privacy (WEP) protocol?

A

RC4

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

What type of symmetric encryption encrypts entire blocks of data?

A

Block Ciphers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

What do you call authentication schemes that have been developed to work with block ciphers to provide not only encryption but also authentication?

A

Authenticated models of operation/Authenticated encryption

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q

What encryption scheme uses 2 mathematically-related, different keys to encrypt and decrypt?

A

Asymmetric Encryption scheme

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
31
Q

What encryption concept involves a 3rd party, such as a government agency or an authorized organization, that holds a special third key used to encrypt the private key, which is then stored in a secure location?

A

Key escrow

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
32
Q

The advantage of an asymmetric scheme over symmetric schemes is that it offers a level of?

A

Authentication and Nonrepudiation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
33
Q

What kind of cryptosystem uses complex mathematical structures to create secure asymmetric algorithms and keys? Often used as a lightweight solution, provides functionality such as encryption an digital signatures.

A

Elliptic-curve Cryptography (ECC)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
34
Q

What kind of key exchange takes places within the normal communication channel?

A

In-band key exchange

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
35
Q

what kind of key exchange utilizes a separate channel outside the norm to authenticate the user?

A

Out-of-band Key exchange

36
Q

What do you call temporary keys that are made each time a key is needed and are temporary in nature?

A

Ephemeral Keys

37
Q

What is designed by using complex cryptographic protocols to prevent the situation where a compromise of one secret key or message leads to a compromise of previous confidential messages?

A

Perfect Forward Secrecy (PFS)

38
Q

What do you call a randomly generated input often used in hashing?

A

Salt

39
Q

What do you call a one-time use number that are randomly created to ensure if the same message is encrypted twice then the outcomes are different?

A

Initialization Vector (IV)

40
Q

What do you call numbers that are used once for a limited time?

A

Nonces

41
Q

What are the difference between nonces and IV’s?

A

IV’s are random

42
Q

What do you call the process of taking a weak key and making it stronger against attacks by creating an enhanced key; an initial key and hash function or block cipher applied in a loop?

A

Key stretching

43
Q

What kind of cryptography uses light waves pulsing over fiber optic cable to transmit code which shares the key between two users?

A

Quantum Cryptography

44
Q

What kind of encryption encrypts data while it is being processed? It also allows for computation to take place on ciphertext, with a result that matches what the value of the plaintext would have been if not encrypted.

A

Homomorphic Encryption

45
Q

What concept refers to algorithms, generally asymmetric, that are considered secure against attacks using quantum computing?

A

Post-Quantum Computing

46
Q

What is the concept of hiding data in other media such as graphic images, digital audio, or video files?

A

Steganography

47
Q

What do you call publicly accessible ledgers that record online transactons?

A

Blockchains

48
Q

What prevent messages from being modified in transit?

A

Hashing algorithms

49
Q

What do you call a mathematical function that takes a variable-sized message and transforms it into a fixed-length value? Difficult to reverse and the results are never decrypted.

A

One-way Hash

50
Q

What do you call the output of a one-way hash?

A

Hash Value/Message Digest

51
Q

Attacks against one-way hash functions can be prevented by using?

A

longer hash values

52
Q

What occurs when 2 different hash messages result in the same hashing value?

A

Hash value collisions

53
Q

What attack occurs when an attacker intercepts a hash and uses it to authenticate directly, rather than using the underlying plaintext password?

A

Pass the Hash Attack

54
Q

What is created when the digest of the message is encrypted using the sender’s private key?

A

Digital signature

55
Q

What hash produces a 128-bit hash value used for security applications and integrity checking?

A

MD5

56
Q

What do you call a key agreement protocol that enables users to exchange encryption keys over an insecure medium?

A

Diffie-Hellman Exchange (DHE)

57
Q

What key agreements allow the two parties to authenticate each other through the addition of more advanced technologies and is used in the Public Key Infrastructure?

A

Elliptic-curve Diffie-Hellman Exchange (ECDHE)

58
Q

What asymmetric algorithm is used for both digital signatures and general encryption? Widely used in open standards and cryptosystems, including PGP and GPG.

A

ElGamal

59
Q

What is the digital authentication standard of the US Government?

A

Digital Signature Algorithm (DSA)

60
Q

What do you call an encrypted hash value used to ensure the identity and integrity of a message?

A

Digital signature

61
Q

What guarantees the individual sending the message is who he claims to be?

A

Digital signature

62
Q

What is the hash function message digest originally based on MD4?

A

RIPEMD

63
Q

What is used as an algorithm for message authentication purposes, where the authentication is applied using hash functions and a secret key to create an authentication code value?

A

Hash-based Message Authentication Code (HMAC)

64
Q

Information assurance through encryption protects information and information systems by securing their what?

A

Confidentiality, integrity, authentication, and nonrepudiation

65
Q

Random numbers are often used within algorithms to prevent?

A

Replay attacks

66
Q

What do you call a small, fast key that is used for encryption in small mobile devices?

A

ECC

67
Q

What is a feature of specific key agreement protocols that assures session keys will not be compromised if long-term secrets (private keys) used in session key exchange are compromised?

A

PFS

68
Q

What indicates that a cryptographic system generates random public keys for each session and it does not use a deterministic algorithm in the process?

A

PFS

69
Q

What encryption algorithm is typically used for bulk encryption/encrypting large amounts of data?

A

Symmetric

70
Q

What kind of encryption algorithm is AES256?

A

Symmetric

71
Q

What encryption algorithm is typically used for the distribution of symmetric bulk encryption keys (shared keys)?

A

Asymmetric

72
Q

What encryption algorithm is typically used for identity authentication via digital signatures and certificates?

A

Asymmetric

73
Q

What encryption algorithm is typically used for non-repudiation services and key agreements?

A

Asymmetric

74
Q

What are typically used for the verification of digital signatures?

A

Hash functions

75
Q

What are typically used for the generation of pseudo-random numbers?

A

Hash functions

76
Q

What do you call the practice of harnessing the principles of quantum mechanics to improve security and detect whether a third party is eavesdropping on communications?

A

Quantum Cryptography

77
Q

What mode of operation for block ciphers is the simplest and least secure mode? Processes 64-bit blocks, encrypts blocks with the chosen key.

A

Electronic Codebook Mode (ECB)

78
Q

What mode of operation for block ciphers has each block of unencrypted text XORed with the block of ciphertext immediately preceding?

A

Cipher Block Chaining (CBC)

79
Q

What mode of operation for block ciphers uses an incrementing counter instead of a seed? Errors do not propagate.

A

Counter (CTR)

80
Q

What is the go to option for encryption for low power small devices?

A

ECC (Asymmetric)

81
Q

What is the go to option for encryption for the military?

A

AES 256 (Symmetric)

82
Q

What kind of encryption allows users to run calculations on data while it is still encrypted?

A

Homomorphic Encryption

83
Q

What kind of encryption allows data to be encrypted and out-sourced to commercial clouds for processing?

A

Homomorphic Encryption

84
Q

Low power devices often use _________ for encryption, as it uses a small key.

A

ECC

85
Q

What should be used to check/support file integrity?

A

File Hash

86
Q

What can be used to ensure integrity for email?

A

Digital signatures