SON5 Flashcards

1
Q

What is cryptography, and why is it important?

A

๐Ÿ”น Definition โ€“ The art & science of securing communication from unauthorized access.
๐Ÿ”น Core Idea โ€“ Uses encryption to protect confidentiality, integrity, and authenticity.
๐Ÿ”น Mnemonic โ€“ Think of a locked diaryโ€”only someone with the key (encryption) can read it!

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

How does cryptanalysis differ from cryptography?

A

Definition โ€“ The study of breaking codes and ciphers.
๐Ÿ”น Purpose โ€“ Identifies weaknesses in cryptographic systems.
๐Ÿ”น Example โ€“ Brute-force attacks and side-channel attacks.
๐Ÿ”น Mnemonic โ€“ Think of a hacker cracking a secret code to reveal hidden messages!

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What does cryptology include, and how is it different from cryptography?

A

๐Ÿ”น Cryptology = Cryptography + Cryptanalysis.
๐Ÿ”น Field of study โ€“ Covers both creating and breaking encryption.
๐Ÿ”น Think of it as the umbrella term for everything encryption-related.
๐Ÿ”น Example โ€“ A cybersecurity expert who both encrypts and tests security systems.
๐Ÿ”น Visualization โ€“ A two-sided coin: one side encrypts, the other breaks encryption.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is a cryptovariable, and why is it crucial in encryption?

A

๐Ÿ”น Definition โ€“ Cryptographic keys, also called cryptovariables, are used for encryption & decryption.
๐Ÿ”น Importance โ€“ Secure key management = stronger encryption.
๐Ÿ”น Example โ€“ AES encryption relies on secret keys.
๐Ÿ”น Mnemonic โ€“ The key to a treasure chestโ€”without it, the gold (data) stays locked!

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What are the four main goals of cryptography?

A

๐Ÿ”น Confidentiality โ€“ Keeps data secret using encryption.
๐Ÿ”น Integrity โ€“ Prevents unauthorized changes using hash functions.
๐Ÿ”น Authentication โ€“ Verifies identity (e.g., digital certificates).
๐Ÿ”น Non-repudiation โ€“ Prevents denial of actions (e.g., digital signatures).
Tip: Use the mnemonic C.I.A.N. โ€“ Confidentiality, Integrity, Authentication, Non-repudiation!

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

How do cryptographic keys and algorithms work together?

A

๐Ÿ”น Keys โ€“ Unique strings of bits that encrypt/decrypt data.
๐Ÿ”น Algorithms โ€“ Lock that transforms data; keys act as the unlocking tool.
๐Ÿ”น Security Factor โ€“ Stronger, longer, and random keys = better encryption.
๐Ÿ”น Key Management โ€“ Even strong algorithms fail with weak or exposed keys.
(Tip: Think of a padlock and keyโ€”the lock (algorithm) stays the same, but different keys (cryptographic keys) control access!)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What does Kerckhoffsโ€™s Principle say about cryptographic security?

A

๐Ÿ”น Definition โ€“ A cryptosystem remains secure even if its design is public, as long as the key stays secret.
๐Ÿ”น Why it matters โ€“ Security should rely on key secrecy, not algorithm secrecy.
๐Ÿ”น Real-world example โ€“ Modern encryption (e.g., AES) is public, but its security depends on the key.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

When should you use a block cipher, and how does it work?

A

๐Ÿ”น Encrypts data in fixed-size blocks (e.g., AES - 128-bit blocks).
๐Ÿ”น Best for large data processing (e.g., file encryption).
๐Ÿ”น Stronger but slower than stream ciphers.
(Tip: Think of a chessboardโ€”each piece (block) moves in a structured way! โ™Ÿ๏ธ)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What are stream ciphers used for, and why are they faster?

A

๐Ÿ”น Encrypts data one bit/byte at a time (e.g., RC4).
๐Ÿ”น Best for real-time data streams (e.g., voice calls, low-power devices).
๐Ÿ”น Faster but riskier if key reuse occurs.
(Tip: Think of a waterfallโ€”data flows continuously, and encryption happens in real time! ๐ŸŒŠ)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

How does a substitution cipher work, and what is a common example?

A

๐Ÿ”น Replaces each letter with another letter/symbol (e.g., Caesar cipher shifts letters).
๐Ÿ”น Keeps letter order the same, but changes their identity.
๐Ÿ”น Easy to break with frequency analysis.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

How does a transposition cipher work, and how is it different from a substitution cipher?

A

๐Ÿ”น Rearranges the letters in plaintext without changing them.
๐Ÿ”น Same letters, different order (e.g., Rail Fence Cipher).
๐Ÿ”น Stronger with complex patterns, but still breakable.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

How does key stretching strengthen weak passwords?

A

๐Ÿ”น Definition โ€“ Enhances weak passwords by making them harder to brute-force.
๐Ÿ”น How it works โ€“ Repeatedly hashes a password with additional data (e.g., salt).
๐Ÿ”น Purpose โ€“ Increases computation time, slowing down attackers.
๐Ÿ”น Examples โ€“ PBKDF2, bcrypt, Argon2.
(Tip: Think of kneading doughโ€”the more you work it, the stronger it gets! ๐Ÿž)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Why is key sharing a challenge in symmetric encryption?

A

๐Ÿ”น Same key for encryption & decryption โ€“ Must be shared & kept secret.
๐Ÿ”น Key management is critical โ€“ Secure distribution is a challenge.
๐Ÿ”น Risk โ€“ If the key is exposed, all encrypted data is compromised.
(Tip: Think of a shared house keyโ€”if someone steals it, they can unlock everything! ๐Ÿ”‘๐Ÿ )

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Why is symmetric encryption faster than asymmetric encryption?

A

๐Ÿ”น Faster & more efficient than asymmetric encryption.
๐Ÿ”น Best for large data encryption (e.g., AES for file encryption).
๐Ÿ”น Uses simpler math operations, reducing processing time.
(Tip: Think of a fast ziplineโ€”quick and direct, unlike the complex routes of asymmetric encryption! ๐Ÿš€)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Where is symmetric encryption commonly used?

A

๐Ÿ”น Used for:

Secure storage (encrypted files & databases).
Data in transit (VPNs, wireless networks).
Bulk encryption (fast and efficient for large data).
๐Ÿ”น Common Algorithms โ€“ AES, DES, 3DES.

(Tip: Think of a locked vaultโ€”great for storing & moving data securely! ๐Ÿ”’)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Why is key management a challenge in symmetric encryption?

A

๐Ÿ”น Same key = Encryption & Decryption โ€“ Must be securely shared & stored.
๐Ÿ”น Scalability issue โ€“ Hard to manage in large networks.
๐Ÿ”น Risk โ€“ If the key is leaked, all data is exposed.
(Tip: Think of a single master keyโ€”if stolen, everything is compromised! ๐Ÿ”‘โš ๏ธ)

17
Q

How does key length affect the security of symmetric encryption?

A

๐Ÿ”น Key length matters โ€“ Longer keys = Stronger encryption.
๐Ÿ”น 128-bit, 256-bit AES โ€“ Harder to brute-force.
๐Ÿ”น Algorithm security โ€“ Must be well-tested & resistant to attacks.
(Tip: Think of a password length ruleโ€”the longer, the harder to crack! ๐Ÿ”๐Ÿ’ก)

18
Q

Why is key distribution a major challenge in symmetric encryption?

A

๐Ÿ”น Same key for encryption & decryption โ€“ Must be securely shared.
๐Ÿ”น Risk โ€“ If intercepted, encrypted data is compromised.
๐Ÿ”น Key Exchange Problem โ€“ Needs a secure method to distribute keys (e.g., pre-shared keys or key exchange protocols).
(Tip: Think of a secret letterโ€”if the delivery is intercepted, the message is exposed! โœ‰๏ธ๐Ÿ”‘)

19
Q

Why does symmetric encryption struggle with scalability?

A

๐Ÿ”น More users = More keys โ€“ Key growth is exponential.
๐Ÿ”น Formula โ€“ N(Nโˆ’1)/2 unique keys for N users.
๐Ÿ”น Problem โ€“ Managing many keys becomes impractical in large networks.
(Tip: Imagine a group chat where every pair needs a secret passcodeโ€”it quickly becomes overwhelming! ๐Ÿ“ฒ๐Ÿ”)

20
Q

Why is secure key storage critical in symmetric encryption?

A

๐Ÿ”น Keys must be securely stored โ€“ If stolen, data is exposed.
๐Ÿ”น More users = Harder key protection โ€“ Large systems increase risk.
๐Ÿ”น Solution โ€“ Use hardware security modules (HSMs) or encrypted storage.
(Tip: Think of a bank vault for keysโ€”if someone steals the key, they unlock everything! ๐Ÿ”‘๐Ÿฆ)

21
Q

Why does symmetric encryption fail to provide non-repudiation?

A

๐Ÿ”น Same key for all users โ€“ No way to track who encrypted/decrypted data.
๐Ÿ”น No proof of authorship โ€“ Cannot verify which user performed an action.
๐Ÿ”น Alternative โ€“ Asymmetric encryption (digital signatures) enables non-repudiation.
(Tip: Imagine a shared PIN codeโ€”anyone can use it, but you canโ€™t prove who did! ๐Ÿ”ข๐Ÿคทโ€โ™‚๏ธ)

22
Q

What are the key characteristics of DES encryption?

A

๐Ÿ”น 64-bit block cipher โ€“ Encrypts data in fixed-size blocks.
๐Ÿ”น 56-bit effective key โ€“ (64-bit key, but 8 bits used for parity).
๐Ÿ”น Uses XOR operations โ€“ For encryption transformation.
๐Ÿ”น 16 rounds of processing โ€“ Strengthens encryption but now considered weak.
(Tip: Think of a lock with 16 turnsโ€”each round strengthens encryption but can still be picked! ๐Ÿ”)

23
Q

How does 3DES improve on DES, and why is it being phased out?

A

๐Ÿ”น Applies DES three times per block for stronger encryption.
๐Ÿ”น 64-bit block cipher โ€“ Same block size as DES.
๐Ÿ”น Key sizes: 64-bit, 112-bit, or 168-bit (but effective strength ~111 bits).
๐Ÿ”น End-of-life โ€“ No longer recommended, AES is the better replacement.
(Tip: Think of locking a box three timesโ€”stronger than one lock, but outdated! ๐Ÿ”๐Ÿ”๐Ÿ”)

24
Q

What improvements did IDEA bring over DES?

A

๐Ÿ”น Created to replace DES โ€“ Addressed weak key length.
๐Ÿ”น 64-bit block cipher โ€“ Encrypts data in fixed blocks.
๐Ÿ”น Key sizes: 64-bit or 128-bit, divided into 52 subkeys.
๐Ÿ”น Still secure, but replaced by AES in modern systems.
(Tip: Think of a more complex lock with more keysโ€”harder to break! ๐Ÿ”‘๐Ÿ”)

25
๐Ÿ‘‰ Question: What makes Blowfish different from other symmetric encryption algorithms?
๐Ÿ”น Designed for flexibility โ€“ Uses variable key sizes. ๐Ÿ”น 64-bit block cipher โ€“ Encrypts in fixed blocks. ๐Ÿ”น Key range: 32-bit to 448-bit, allowing stronger security. ๐Ÿ”น Still widely used, but AES is preferred for modern encryption. (Tip: Think of a lock with adjustable security levelsโ€”customizable protection! ๐Ÿ”‘๐Ÿ”„)
26
Why is RC4 no longer recommended for encryption?
๐Ÿ”น Stream cipher โ€“ Encrypts data one bit/byte at a time. ๐Ÿ”น Variable key size โ€“ 40-bit to 2048-bit. ๐Ÿ”น Widely used in WEP & older SSL/TLS, but now considered insecure. ๐Ÿ”น Vulnerable to attacks โ€“ Key reuse exposes encryption weaknesses. (Tip: Think of a fast but leaky lockโ€”quick encryption but weak security! ๐Ÿš€๐Ÿ”“)
27
What are the key features of RC5, and why is it not widely used?
๐Ÿ”น Block cipher with variable block sizes โ€“ 32-bit, 64-bit, or 128-bit. ๐Ÿ”น Highly customizable key size โ€“ 0-bit to 2048-bit. ๐Ÿ”น Uses data-dependent rotations for added security. ๐Ÿ”น Not widely adopted due to limited implementation. (Tip: Think of a modular encryption systemโ€”adjustable but unpopular! ๐Ÿ—๏ธ๐Ÿ”’)
28
How does RC6 improve upon RC5, and why wasn't it chosen as AES?
๐Ÿ”น Successor to RC5 โ€“ Improved speed, security, and efficiency. ๐Ÿ”น 128-bit block cipher โ€“ More structured and resistant to attacks. ๐Ÿ”น Variable key sizes โ€“ 128-bit, 192-bit, or 256-bit. ๐Ÿ”น AES competition finalist โ€“ Lost to AES but remains secure. (Tip: Think of an optimized security upgradeโ€”better but not the industryโ€™s choice! ๐Ÿš€๐Ÿ”)
29
What are the differences between CAST-128 and CAST-256?
๐Ÿ”น Symmetric cipher using a Feistel network. ๐Ÿ”น Two versions: CAST-128 โ€“ 64-bit block cipher, key sizes: 40โ€“128 bits. CAST-256 โ€“ 128-bit block cipher, key sizes: 128โ€“256 bits. ๐Ÿ”น Used in PGP encryption but less common today. (Tip: Think of two security levelsโ€”CAST-128 for lighter use, CAST-256 for stronger encryption! ๐Ÿ”๐Ÿ”‘)
30
How does Twofish improve on Blowfish, and why wasnโ€™t it chosen for AES?
๐Ÿ”น Successor to Blowfish, designed for stronger encryption. ๐Ÿ”น 128-bit block cipher with variable key sizes (1โ€“256 bits). ๐Ÿ”น Uses pre-whitening & post-whitening to enhance security. ๐Ÿ”น AES competition finalist, but lost to AES. (Tip: Think of a high-tech vaultโ€”strong, but not the chosen standard! ๐Ÿฆ๐Ÿ”)
31
How does AES encryption work, and why is it widely used?
๐Ÿ”น Also known as Rijndael, selected by NIST in 2001. ๐Ÿ”น 128-bit block cipher with key sizes: 128, 192, or 256 bits. ๐Ÿ”น Encryption rounds depend on key size: 128-bit key โ†’ 10 rounds ๐Ÿ”„ 192-bit key โ†’ 12 rounds ๐Ÿ”„ 256-bit key โ†’ 14 rounds ๐Ÿ”„ ๐Ÿ”น Fast, secure, and widely used (e.g., Wi-Fi, VPNs, file encryption). (Tip: Think of a multi-layered vaultโ€”more layers (rounds) = stronger security! ๐Ÿฆ๐Ÿ”)
32
How does asymmetric encryption protect data?
๐Ÿ”น Uses two keys: Public key (shared) & Private key (secret). ๐Ÿ”น Public key encrypts, private key decrypts. ๐Ÿ”น Used for secure communication (e.g., HTTPS, digital signatures). (Tip: Like a locked mailboxโ€”anyone can drop in a letter, but only the owner has the key! ๐Ÿ“ฌ๐Ÿ”‘)
33
Why is asymmetric encryption useful despite being slower?
โœ… Advantages: ๐Ÿ”น Solves key sharing issues โ€“ Public keys can be openly shared. ๐Ÿ”น Enables digital signatures โ€“ Provides authentication & non-repudiation. โŒ Disadvantages: ๐Ÿ”น Slower than symmetric encryption. ๐Ÿ”น Private key security is critical โ€“ If leaked, encryption is broken. (Tip: Like a sealed envelope with a signatureโ€”ensures both privacy and authenticity! โœ‰๏ธ๐Ÿ”)
34
Why do hybrid cryptosystems use both symmetric and asymmetric encryption?
๐Ÿ”น Combines symmetric & asymmetric encryption for security & efficiency. ๐Ÿ”น Asymmetric encryption โ€“ Secures key exchange. ๐Ÿ”น Symmetric encryption โ€“ Encrypts bulk data (faster). ๐Ÿ”น Benefits: Efficient โ€“ Fast encryption with secure key sharing. Secure โ€“ Unique session keys limit exposure. Scalable โ€“ Works well for large networks. ๐Ÿ”น Used in: SSL/TLS, VPNs, secure email, cloud storage. Tip: Think of sending a secure packageโ€”the lock (symmetric encryption) is fast, but the key (asymmetric encryption) is securely delivered separately! ๐Ÿ“ฆ๐Ÿ”
35