Security+ 601 Cryptography Terms Flashcards

1
Q

Means hidden/secret or confidential. This also provides non-repudiation/integrity or never changes

A

Cryptography

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Unencrypted information or data sent in the clear

A

Plaintext

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

An algorithm used to encrypt or decrypt

A

Cipher

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

The art of cracking encryption. Researchers are constantly trying to find weaknesses in ciphers. This is also tells us that a mathematically flawed cipher is bad for everyone.

A

Cryptoanalysis

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

This helps programmers by providing a technique to where they don’t have to make keys from scratch. Numbers of this already exist to make key stretching algorithms

A

Key Stretching Libraries

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

This generates passwords and is an extension to the UNIX crypt library. This also uses a Blowfish cipher to perform multiple rounds of hashing

A

Bcrypt Library

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Another key stretching library. This is part of the RSA public key cryptography standards (PKCS #5, RFC 2898). This is a library you can use to make your applications more secure.

A

Password -Based Key Derivation Function 2 (PBKDF2)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Performing cryptographic functions usually requires extensive CPU and additional resources, This helps provide cryptographic functions without extensive CPUs and additional functions.

A

Lightweight Cryptography

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Encrypted data is difficult to work with. You have to decrypt data, perform a function, and encrypt the answer. This helps with the hard process of encryption. This also helps with performing calculations of data while its encrypted. This also performs the work directly on the encrypted data. Decrypted data can only be viewed with the private key.

A

Homomorphic encryption

How well did you know this?
1
Not at all
2
3
4
5
Perfectly