Study guide Flashcards

1
Q

What is the Bifid Cipher?

A

A cipher that maps letters to numeric values and combines substitution and transposition.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is the Playfair Cipher?

A

A cipher using a 5x5 matrix of letters for digraph substitution (pairs of letters).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is the Caesar Cipher?

A

A cipher that shifts each letter of the plaintext by a fixed number.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is the purpose of the Kasiski Examination?

A

It breaks the Vigenère/Polyalphabetic cipher.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What does XOR operation do?

A

XOR compares two binary values; for example: 1110 XOR 1011 = 0101.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is the difference between symmetric and asymmetric cryptography?

A

Symmetric: Fast speed

Asymmetric: More secure

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What are the components known to the recipient before encryption in both symmetric and asymmetric cryptography?

A
  • Nonce
  • Private Key
  • Public Key
  • Cryptographic Algorithm
  • Plaintext
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is Privacy Enhanced Mail (PEM)?

A

A text-based format for certificates.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is a True Random Number Generator (TRNG)?

A

A device that generates random numbers using a physical process.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Which cipher does the Clipper Chip use?

A

Skipjack.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is the purpose of a digital signature?

A

To verify that a data entity was created by the claimed sender.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What are differential cryptanalysis, algebraic attack, and linear cryptanalysis?

A

Types of attacks on cryptographic algorithms.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

How does key length affect performance and security?

A

As key length increases, performance decreases, but security improves.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is the LM hash mechanism?

A

A method used to store passwords in a hashed form in Windows operating systems.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

How often is a new block added to the blockchain?

A

Every 10 minutes.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

How do mining rewards relate to blockchain length?

A

As blockchain length increases, mining rewards decrease.

17
Q

What are the steps to send a digitally signed message using public cryptography?

A
  • Generate a public/private key pair
  • Sign the message with the private key
  • Send the signed message
18
Q

What are the block cipher modes of operation?

A
  • ECB: Each block is processed separately with the same key.
  • CBC: Initialization vector (IV) encrypts the first block and then encrypts subsequent blocks.
  • CFB: IV is encrypted, XORed with the next block, and used as an IV for subsequent blocks.
  • OFB: Block 1 is XOR’d with the encrypted IV; the output is XOR’d with the second block.
  • CTR: Encrypts and XORs a counter value and nonce with the plaintext block.
19
Q

What is the similarity between AES and RC4?

A

Both are symmetric ciphers.

20
Q

What is a prime number?

A

A number that is divisible by 1 and itself.

21
Q

What encryption standards should you know (WEP, WPA, WPA2)?

A
  • WEP: Uses different keys for different sessions.
  • WPA: Improved security over WEP.
  • WPA2: Stronger security than WPA.
22
Q

What are the stages of key/certificate management?

A
  • Initialization
  • Issued
  • Cancellation
23
Q

What is forward secrecy?

A

A cryptographic property where session keys are not compromised even if the server’s private key is later exposed.

24
Q

What is homomorphic encryption?

A

Encryption that allows computations on encrypted data without revealing the plaintext.

25
Q

What is the difference between WPA-Enterprise and WPA-Personal?

A
  • WPA-Enterprise: Requires authentication using a RADIUS server.
  • WPA-Personal: Uses a pre-shared key for authentication.
26
Q

What is the difference between IPSec transport vs. tunnel mode?

A
  • Transport Mode: Encrypts the payload (data).
  • Tunnel Mode: Encrypts the entire packet, including the header.
27
Q

What is a brute force attack?

A

An attack where every possible key combination is tried until the correct one is found.

28
Q

What is the hash value size for SHA-1?

29
Q

What encryption does GSM use?

A

A5/1 and A5/2 stream encryption.

30
Q

What is OCSP used for?

A

Online Certificate Status Protocol is used to check the revocation status of an X.509 digital certificate.

31
Q

What is the MOD function?

A

A mathematical operation where you divide one number by another and return the remainder (e.g., 53 mod 11 = 9).

32
Q

What is NT LAN Manager (NTLM)?

A

An authentication protocol used in Windows. If the password is shorter than 14 characters, it is padded with null characters before encryption.

33
Q

What is Chaskey?

A

A 128-bit hash function.

34
Q

Why create a hash when collecting evidence?

A

To ensure data integrity by generating a unique identifier for the data.

35
Q

What does PKCS #5, 7, 10, and 12 stand for?

A

Standards for key management and cryptographic operations, such as password-based encryption and public key certificates.

36
Q

What is the recommended way to memorize the blocks and keys for cryptographic algorithms?

A
  • Blocks: CART = 128, other = 64 (except RC5).
  • Keys: CARBT = 128, 192, 256, others need to be memorized.