Week 6- Principles of cryptography: fundamentals and symmetric systems Flashcards

1
Q

What is Cryptology?

A

the science of secure communications

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

what is cryptanalysis?

A

the study of encryption to detect vulnerabilities and propose cryptographic techniques.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

what is cryptography?

A

encode and decode information for secure communication.

achieves confidentiality and integrity of CIA triad.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

what is a block cipher?

A

a cryptographic method, data is broken into smaller blocks for encryption and decryption using a cryptographic key

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

what is a cryptographic key?

A

a numerical value that act as an input to encryption/decryption algorithm.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

what is AES?

A

advanced encryption standard.

symmetric block cypher used across the internet and wi-fi networks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Define Diffie-Hellman (DH)

A

a key exchange, mathematical algorithm whereby two entities can share a symmetric key remotely.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

what does Moore’s law predict?

A

that computer power and its ability to crack a code doubles every 18 months.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

define brute-force-attack

A

an exhaustive cryptanalytic method, attempts every possible key/password combination until on works.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

what is 3DES?

A

3 digital encryption standard

symmetric block cipher with key length 112 or 168 bits.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Define reverse engineering

A

using the output of a device/system to figure out how it works

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is a dictionary attack?

A

an attempt to break into a password protected system by using a list of well-known words or phrases.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

define digital signature

A

authenticating the authorship of a message

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

define digital certificate

A

proof of ownership of a public key

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

define public key

A

asymmetrical cryptographic key available to anyone

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Define web of trust

A

an arrangement of entities where there is a relationship of trust

17
Q

define plaintext

A

unencrypted information

18
Q

define ciphertext

A

encrypted information

19
Q

define a cipher or cryptographic algorithm

A

mathematics responsible for turning plaintext to ciphertext or reverting it back plaintext

20
Q

define encryption

A

the process of converting plaintext to ciphertext

21
Q

define cryptographic key

A

a numerical value with a string of bits of specific size used to encrypt or decrypt

22
Q

define encryption key

A

a cryptographic key, a piece of information used with an algorithm (cipher) to turn plaintext to ciphertext

(decryption key does the opposite)

23
Q

define symmetric cryptography

A

encryption and decryption use the same cryptographic key

24
Q

define asymmetric cryptography

A

encryption and decryption use different keys

25
Q

define decryption

A

the act of taking a encrypted message and rendering it readable

26
Q

ciphers can be categorised into 2 types, what are they?

A

block cipher
divides plaintext into fixed lengths of bits (3DES)

stream cipher

a symmetric method, bits are encrypted one at a time for streaming audio/video

27
Q

define initialisation vector

A

the value required in the generation of a block or stream cipher, should not be easily predicted

28
Q

what is CSPRNG

A

cryptographically secure pseudo random number generator

an algorithm that produces random numbers, may rely on environmental changes

29
Q

what is stenography

A

The study of hiding information inside other information – often in a picture or audio file.