Week 2 Flashcards

1
Q

Encryption

A

The act of taking a message, called plaintext, and applying an operation to it, called cipher, so that you receive a garbled, unreadable message as the output, called ciphertext

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What then two components of the cipher?

A

The encryption algorithm and the key

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Encryption algorithm

A

The underlying logic of process that’s used to convert plaintext into ciphertext

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Key

A

Introduces something unique into your algorithm

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Cryptosystem

A

A collection of algorithms for key generation and encryption and decryption operations that comprise a cryptographic service should remain secure - even if everything about the system is known, except the key

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Shannon’s Maxim

A

The system should remain secure even if the enemy knows exactly what kind of encryption systems you’re employing, as long as your keys remain secure

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Frequency analysis

A

The practice of studying the frequency with which letters appear in a cipher text

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Steganogrsphy

A

The practice of hiding information from observers, but not encoding it.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Symmetric key algorithm

A

Use the same key to encrypt and decrypt

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Substitution cipher

A

An encryption mechanism that replaces parts of your plaintext with ciphertext

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Steam cipher

A

Takes of a stream of input and encrypts the stream one character or one digit at a time, outputting one encrypted character or digit at a time

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Block ciphers

A

The cipher takes data in, places it into a bucket or block of data that’s a fixed size, then encodes that entire block as one unit

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Initialization vector

A

A bit of random data that’s integrated into the encryption key and the resulting combined key is then used to encrypt the data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What’s the Caesar cipher and an example of one?

A

It’s a type of substitution cipher and an example would be ROT13

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

RC4 (Rivest Cipher 4)

A

A symmetric stream cipher that gained widespread adoption because of its simplicity and speed

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

MAC (Message Authentication Codes)

A

A bit of information that allows authentication of a received message, ensuring that the message came from the alleged sender and not a third party

17
Q

How does a keyed-hash message authentication code work?

A

Uses a cryptographic hash function along with a secret key to generate a MAC

18
Q

Elliptic curve cryptography

A

A public key encryption system that uses the algebraic structure of elliptic curves over finite fields to generate secure keys

19
Q

Hashing

A

A type of function of operation that takes in an arbitrary data input and maps it to an output of fixed size, called a hash or digest

20
Q

Rainbow table

A

A table containing common passwords and their respective HASHes. Used by black hat hackers

21
Q

Password salt

A

Additional randomized data that’s added into the hashing function to generate a hash that’s unique to the password and salt combination

22
Q

Public Key infrastructure

A

A system that defines the creation, storage and distribution of digital certificates

23
Q

Digital certificate

A

A file that proves that an entity owns a certain public key, and it contains info on the public key, the entity it belongs to, and a digital signature from another party that has verified the information

24
Q

Certificate authority

A

The entity responsible for storing, issuing, and signing certificates

25
Q

Registration authority

A

Responsible for verifying the identities of any entities requesting certificates to be signed and stored with the CA

26
Q

What did ignorant when the root certificate authority signs a certificate?

A

The entity the root certificate signed for can now sign other certificates

27
Q

Pretty good privacy (PGP)

A

An encryption application that allows authentication of data, along with privacy from third parties, relying upon asymmetric encryption to achieve this