Week 2 - Symmetric Encryption Flashcards

1
Q

What is cryptography?
general idea

A

General idea that describes the practice of coding and hiding messages from potential enemies (been around for thousands of years)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is encryption?

A

the action of taking a plaintext message + apply a cipher to it = ciphertext, garbled unreadable text

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What are 2 components a cipher is made out of?

A

the encryption algorithm
the key

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What’s an encryption algorithm?

A

the processes that convert the plaintext into ciphertext

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is the key when it comes to the cipher operation?

A

it introduces something unique into your cipher so anyone using the same algorithm can’t decode the message

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What does security through obscurity mean?

A

basically that if no one knows what algorithm we’re using, we’re safe from attackers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is a cryptosystem?

A

Even if the enemy knows your exact encryption algorithm, they’re still unable to recover the plaintext from an intercepted ciphertext

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is cryptanalysis?

A

looking for hidden messages, trying to decipher coded messages

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Frequency analysis is the practice of studying what?

A

studying the frequency with which letters appear in ciphertext

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What was the first programmable digital computer developed during WWII to aid in the use of automation technology to apply to cryptanalysis?

A

Colossus

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is steganography the practice of?

A

the practice of hiding information from 3rd parties but not encoding it

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What’s an example of steganography?

A

Writing a letter with invisible ink, must be made visible using a mechanism known to the recipient

(no decoding necessary)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What are some modern steganography techniques?

A

embedding messages or files into other files (images, videos) that can be extracted using steganography software

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is a symmetric key algorithm? Why is it called symmetic? (1)

A

These are called symmetric because they use the same key to encrypt and decrypt a message

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is a substitution cipher?

A

an encryption mechanism that replaces parts of the plaintext with ciphertext

(like when you substitute certain letters for other letters in a message)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is the ROT13 substitution cipher?

A

(Rotate13, “rotate by 13 places”, sometimes hyphenated ROT-13) is a simple letter substitution cipher that replaces a letter with the 13th letter after it in the Latin alphabet.

17
Q

What’s a Caesar Cipher?

A

simple encryption technique that involves replacing letters in a message with other letters or symbols by shifting them a fixed number of positions in the alphabet

18
Q

ROT13 is a ___ Cipher that uses a key of ____

A

ROT13 is a substitution cipher that uses a key of 13.

19
Q

What’s a stream cipher?

A

a cryptographic algorithm that encrypts and decrypts data in a continuous stream, one bit or byte at a time

20
Q

How does a block cipher encode data?

A

by breaking it into fixed-size blocks(128/64bits) and using a secret key to transform each block into ciphertext

21
Q

Which symmetric ciphers are faster and less complex but may be less secure: stream or cipher?

A

stream ciphers

22
Q

What does a key size comprise of? (defined in bits/data)

23
Q

Key size is the upper limit for the total possible keys for a given ___ ____

A

cryptographic algorithm

24
Q

What symmetric block cipher replaced DES?

A

Advanced Encryption Standard (AES)

25
Q

What’s the difference between AES and DES symmetric encryption? (2)

A

AES: Uses a key size of 128, 192, or 256 bits. Harder to crack.
DES: Uses a 56-bit key size

26
Q

Are brute force attacks possible on AES encryption standards today?

A

AES-256 encryption is considered virtually uncrackable using brute force methods

27
Q

What popular algorithm was dropped due to its weakness and vulnerabilities?

28
Q

Web browsers dropped support for RC4 along with all versions of SSL and adopted what instead?

A

TLS 1.3 and other algorithms like AES and 3DES