Test Flashcards

1
Q

Key people behind RSA

A

Ron Rivest, Adi Shamir, and Leonard Adleman

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

RSA was publicly described the algorithm in

A

1977

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Applications and use cases of rsa

A
  1. Digital Signatures
  2. Digital Certificates
  3. Secure Communication Protocols
  4. Secure Key Exchange
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Blowfish designed by (name) in (year)

A

Bruce Schneier
1993

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Blowfish have (number) of bit

A

64-bit

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

It is significantly faster than DES and provides a good encryption rate with no effective cryptanalysis technique found to date.

A

Blowfish Key Exchange

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

The Blowfish encryption algorithm is suitable for use in scenarios where a fast, secure, and freely available encryption technique is needed. Some common use cases include:

A
  1. Data Encryption
  2. Network Security
  3. Software Protection
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Blowfish PROS

A

Fast
Resilient
Open

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Blowfish CONS

A

Blocksize

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

3DES SECURITY FEATURES:

A
  1. Triple DES ( 3 DES) is a symmetric encryption algorithm based on the Data Encryption Standard ( DES).
  2. It uses three successive DES operations ( encrypt- decrypt- encrypt) to achieve enhanced security.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

3DES KEY SECURITY ASPECTS:

A
  1. Key Length: Uses three 56 - bit keys ( 168 bits total) for encryption, making brute- force attacks computationally infeasible.
  2. Key Variability: Offers keying options ( e. g., all three keys are independent or two keys are the same) to adapt to different security requirements.
  3. Block Size: Operates on 64 - bit blocks, which provides a larger data block size compared to DES.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

ADVANTAGE OF TRIPLE DES:

A
  1. Robust Security: Provides a higher level of security compared to single DES due to the triple encryption process.
  2. Backward Compatibility: Maintains compatibility with existing DES implementations and infrastructure.
  3. Widely Adopted: Still widely used in legacy systems and environments where stronger encryption standards are required.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

DES stands for

A

Data Encryption Standard

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

DES algorithm uses a key of

A

56-bit size

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

DES is a block cipher with (number) rounds of (Name) structure

A

16
Feistel

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

In 2002, it was overthrown by AES, which became the new standard following a public competition.

A

DES (Data Encryption Standard)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

The AES Encryption algorithm also
known as the

A

Rijndael algorithm

18
Q

AES is a symmetric block ciper algorithm with a block/chunk size of

19
Q

features of AES

A
  1. SP NETWORK
  2. KEY EXPANSION
  3. BYTE DATA
  4. KEY LENGTH
20
Q

It works on an SP network structure rather than a Feistel cipher
structure, as seen in the case of the DES algorithm.

A

SP NETWORK (feature of AES)

21
Q

It takes a single key up during the first stage, which is later
expanded to multiple keys used in individual rounds.

A

KEY EXPANSION (feature of AES)

22
Q

The AES encryption algorithm does operations on byte data
instead of bit data. So it treats the 128-bit block size as 16 bytes
during the encryption procedure.

A

BYTE DATA (feature of AES)

23
Q

The number of rounds to be carried out depends on the length of the key being used to encrypt data. The 128-bit key size has ten rounds, the 192-bit 04 key size has 12 rounds, and the 256-bit key size has 14 rounds.

A

KEY LENGTH (feature of AES)

24
Q

4 STEPS OF AES ENCRYPTION
ALGORITHM

A
  1. Sub Bytes
  2. Shift Rows
  3. Mix Columns
  4. Add Round Key
25
Q

Operates on the state array by first converting each byte into its hexadecimal
representation.

A

SubByte (steps of aes algorithm)

26
Q

Performs a cyclic shift on the last three rows of a state
matrix.

A

ShiftRows (steps in aes algorithm)

27
Q

Operates by multiplying a constant matrix with each column in the current state array.

A

Mix Columns (steps in aes algorithm)

28
Q

The algorithm performs a bitwise XOR operation between
the current state array, obtained from the prior step, and a key specific to the current round.

A

Add Round Key (steps in aes algorithm)

29
Q

A cryptographic
protocol that allows two parties to establish a shared
secret key over an insecure communication channel.

A

Diffie-Hellman key exchange

30
Q

Why cryptography protocols are needed
for secure communication?

A
  1. Confidentiality
  2. Integrity
  3. Authentication
  4. Non-repudiation
  5. Key exchange
31
Q

Diffie Hellman Key Exchange was invented by (name) and (name) in (year)

A

Whitfield Diffie and Martin Hellman
in 1976

32
Q

Key Exchange Process

A
  1. Parameter Selection
  2. Private Key Generation
  3. Public Key Computation
  4. Public Key Exchange
  5. Shared Secret Key Computation
  6. Shared Secret Key
33
Q

Security Features of Diffie Hellman Key exchange

A
  1. Perfect Forward Secrecy
  2. Protection Against Eavesdropping
  3. Key Exchanged without Pre-shared keys
  4. Resistance to Man-in-the-Middle Attacks
  5. Computational Complexity
  6. Flexibility
34
Q

Applications of Diffie - Hellman

A
  • Secure Communication
  • Key Establishment for Symmetric Encryption
  • VPN (Virtual Private Network) Protocols
  • SSH (Secure Shell) Protocol
  • Wireless Communication Security
  • Digital Signatures and Key Agreement
  • Secure Messaging Protocols
35
Q

Diffie Hellman Key Exchange Limitations

A
  • Man-in-the-middle attacks
  • Vulnerabilities in specific implementations
  • Forward Secrecy
36
Q

Who invented Hill Cipher and in what year

A

Lester S. Hill
1929

37
Q

First polygraphic cipher

A

Hill Cipher

38
Q

Polygraphic substitution cipher based on linear algebra

A

Hill Cipher

39
Q

Each letter is represented by modulo 26

A

Hill Cipher

40
Q

Advantage of Hill Cipher

A
  • Perfectly conceals single-letter frequencies
  • Easily solvable when dealing with 2x2 matrices
  • Useful when hiding a single-letter or two-letter frequency information
  • High diffusion and strong tamper resistance without detection
  • It can withstand any attack, except if the attack is through a known plaintext
41
Q

Disadvantages of Hill Cipher

A
  • Vulnerable to know-plaintext attacks
  • A simple 2x2 matrix is quite simple. Still, when it expands, the calculations to encrypt or decrypt the data become much more complex, requiring a deep understanding of higher mathematics