Week 5: Advanced Security & Encryption Flashcards

1
Q

What is the assumption when sending data over a network?

A

We assume physical endpoints (like computers and servers) are secure, but data on networks is always potentially vulnerable.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What are man-in-the-middle (MITM) attacks?

A

These occur when an attacker intercepts, alters, and redirects communications between two parties, such as Alice and Bob.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

How can unencrypted data be compromised in MITM attacks?

A

Unencrypted data can be easily read, altered, or stolen if intercepted during transmission.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What are ciphers used for in cryptography?

A

Ciphers encrypt data to protect it from being read or altered by unauthorized parties.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is a transposition cipher?

A

A cipher that rearranges the letters of a message in a fixed, reversible pattern. Example: “hello world” → “ehlol owrdl”.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is a substitution cipher?

A

A cipher that replaces each letter in a message with another letter. Example: “hello world” → “ifmmp xpsme”.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is a famous historical substitution cipher?

A

The Caesar Cipher, used by Julius Caesar to protect messages from interception.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What are the weaknesses of basic ciphers?

A

Patterns in the ciphertext can reveal the plaintext, especially using frequency analysis of common letters like ‘E’.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What are polyalphabetic ciphers?

A

Ciphers that use multiple alphabets to encrypt a message, changing the cipher partway through the text for added security.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What are the challenges of polyalphabetic ciphers?

A

Keeping the cipher secure and ensuring it is not lost. If compromised, all security is lost.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is Kerckhoffs’s principle?

A

The security of an encryption system should rely on the secrecy of the key, not the encryption protocol itself.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is the key exchange problem?

A

The challenge of securely sharing a key between parties without it being intercepted by others.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is the Diffie-Hellman Principle?

A

A method for securely establishing a shared secret over an insecure channel using mathematical function

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

How is the Diffie-Hellman Principle often explained metaphorically?

A

Using the mixing of paint colours to represent mathematical functions. Once mixed, it is computationally difficult to reverse-engineer the original colours.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is public key/private key encryption?

A

A system where a public key is used to encrypt messages, and a private key is used to decrypt them.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

How does public key encryption ensure secure communication?

A

Anyone can encrypt a message with the recipient’s public key, but only the recipient can decrypt it with their private key.

17
Q

Why encrypt messages with a private key?

A

To verify the source of the message. Encrypting with a private key ensures authenticity because only the private key holder can encrypt data that the corresponding public key can decrypt. This process is used in digital signatures to prove the sender’s identity and confirm the integrity of the message.

This wouldn’t be used for encryption but used for verification, messages that can be decrypted with the public key could only have been encrypted with the private key which only you hold meaning that if you want the world to know that you said something and not anyone else you would do this.

18
Q

What is a one-way or trapdoor function in cryptography?

A

A mathematical function that is easy to compute in one direction but computationally difficult to reverse without special information (e.g., a key).

19
Q

How is prime factorization used in cryptography?

A

Encrypting data relies on the difficulty of factoring large prime numbers, which is computationally intensive to reverse.

20
Q

What was ARPANET?

A

The precursor to the Internet, developed by the U.S. Department of Defence to ensure communication in the event of nuclear war.