P2L5: Intro To Cryptography Flashcards

1
Q

What is Ciphertext?

A

Ciphertext is plaintext that has been encrypted

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What other services does Encryption/Decryption provide?

A

* Integrity checking (no tampering) * Authenticity (verified authorship) * Authentication (not an imposter)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Most protocols use Symmetric ciphers and Asymmetric Ciphers (True or False)

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What are Asymmetric ciphers used for?

A

Authentication, key exchange and digital signatures

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What are Symmetric ciphers used for?

A

Encryption of data/traffic

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What types of attack methods exist related to Encryption/Decryption?

A

* Brute force - trying all possibilities * Cryptanalysis - analysis of algorithm and data characteristics used to decode a message * Implementation attacks - side channel analysis * Social Engineering attacks - the easiest way to get into a system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

If the only form of an attack against encryption was brute force, then the solution would be to do what?

A

Use a longer key length so they just can’t find it in a reasonable amount of time

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is another name for the Caesar Cipher?

A

Shift Cipher

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is a Caesar cipher called when each letter isn’t shifted a specific amount but is instead mapped arbitrarily?

A

Mono-alphabetic cipher

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is the Vigenere cipher?

A

A matrix-like cipher.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What weaknesses exist for the Vigenere cipher?

A

It uses repeating letters and the length of the key can be determined using frequency analysis

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is Kerckhoff’s principle?

A
  • A cryptosystem should be secure even if the attacker knows all the details about the system with exception of the secret key
  • AKA “obscurity shouldn’t be used for security”
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What types of ciphers should you use in real life based on the Kerckhoff principle?

A

Only use widely known ciphers that have been crypto analyzed for many years

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What are the different types of Cryptography?

A
  • Secret Key - ONE Key is used for encryption/decryption
  • Public Key - TWO Keys are used
    • Public for encryption & verification
    • Private for decryption & signing
  • Hash functions - easy to compute and infeasible to crack (weak collision resistant property)
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is the one-way property of a hash function?

A

It’s easy to compute the hash, but computably infeasible to crack it

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is the most commonly used encryption type?

A

block ciphers

17
Q

What does DES stand for?

A

Data Encryption Standard

18
Q

What does AES stand for?

A

Advanced Encryption Standard

19
Q

DES with a key size of 56 bits is breakable with a super computer. True/False

A

True

20
Q

What’s the difference between differential cryptanalysis and linear cryptanalysis?

A
  • Differential analyzes the changes in input on the encrypted output
  • Linear analyzes known phrases and maps them to the encrypted output