Chapter 8: Cryptography Flashcards

1
Q

Transposition Cipher

A

Transposing or scrambling the letters

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Caesar Cipher

A

Shift letters a certain number of spaces in the alphabet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Vigenere Cipher

A

Use a keyword to look up cipher text in a table, so that the encryption would use a different shift for each letter

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

ROT13

A

Shifts every letter 13 places

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Steganography

A

Hiding a message in a medium such as a digital image, audio file, or other file.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

least significant bit (lsb) method

A

Storing data in the least significant bits of the pixels of an image

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Is symmetric or antisymmetric cryptography faster?

A

symmetric

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Data Encryption Standard (DES)

A
  • Uses 56-bit key

- Now considered insecure, replaced by AES

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Triple-DES

A

Uses three DES keys

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Advanced Encryption Standard (AES)

A

Supports 128, 192, and 256 bit key sizes, but default is 128.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

AES256

A

Uses 256 bit key. Makes shit top secret.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

CAST

A

Uses a 40-bit to 128-bit key and is very fast.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Blowfish

A
  • 64-bit symmetric block cipher

- Twofish is similar and has 128-bit block

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

International Data Encryption Algorithm (IDEA)

A

128-bit key, similar to DES but more secure

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

One-time Pads

A

Use a key as long as the plaintext message and are used only once then discarded. So VERY secure

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Forward Secrecy

A

If one key is compromised, subsequent keys will not also .

Called perfect when it is unbreakable.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

How does an asymmetric encryption work?

A

Encrypts with the public key, decrypts with the private key

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Public Key Cryptography (PKC)

A

Any two key encryption system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

RSA

A

Most commonly used public-key algorithm, used for encryption and digital signatures

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Diffie-Hellman Key Exchange

A

Used primarily to send keys across networks, not to encrypt and decrypt messages

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Elliptic Curve Cryptography (ECC)

A

An option to RSA that uses less computing power than RSA and is popular in smaller devices like smartphones

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

ElGamal

A

Transmitting digital signatures and key exchanges

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

Ephemeral Key

A

A key that only exists for a single session

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

ECDHE

A

Elliptic Curve Diffie Hellman using an ephemeral key

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

3 Characteristics of a Hash Functions

A

1) It must be one way
2) Variable-length input produces fixed-length output
3) Hashing two different inputs does not give the same output

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

Secure Hash Algorithm (SHA)

A

Designed to ensure the integrity of a message

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

Message Digest Algorithm (MD)

A

No longer recommended for use hash

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

RIPEMD

A

Based on MD4, it is a hash

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

GOST

A

A hash that processes a variable-length message into a fixed-length output of 256 bits

30
Q

NTLM

A

Hash used primarily for authentication.

31
Q

Rainbow Table

A

All of the possible hashes in a table

32
Q

Salt

A

Adds bits to the message to combat rainbow tables

33
Q

Key Stretching

A

Making a weak key stronger

34
Q

PBKDF2

A

Applies some function to the password or passphrase along with Salt to produce a derived key

35
Q

bcrypt

A

Uses a derivation of Blowfish to hash a password and add Salt to it

36
Q

Chosen Plaintext

A

Looking at a message encrypted and unencrypted and trying to figure out what the encryption method was

37
Q

Work Factor

A

An estimate of the amount of time and effort that would be needed to break the system

38
Q

Message Authentication Code

A

A method of verifying integrity of a message done by adding data generated from the message and some key

39
Q

Hash-Based Message Authentication Code (HMAC)

A

Uses a hashing algorithm along with a symmetric key to add a message authentication code

40
Q

Message Digest

A

The signature area of a message

41
Q

Key Escrow

A

Keys needed to encrypt/decrypt are kept and made available if a third party needs them.

42
Q

Certificate Revocation List (CRL)

A

A list of certificates that are no longer valid

43
Q

Online Certificate Status Protocol (OCSP)

A

A real-time protocol that is replacing CRLs

44
Q

Request For Comments (RFC)

A

Mechanism used to propose a standard

45
Q

Public Key Infrastructure X.509 (PKIX)

A

Develops standards and models for the PKI environment

46
Q

X.509v2

A

Method of issuing CRL certificates

47
Q

End-entity

A

A system that doesn’t issue certificates but uses them

48
Q

End-entity certificate

A

A certificate issued to an end-entity by a CA

49
Q

CA Certificate

A

A certificate issued by one CA to another CA

50
Q

X.509v3

A

End-entity certificates and CA certificates!

51
Q

Cipher Suite

A

A combination of methods such as authentication, encryption, and message authentication code algorithms used together.

52
Q

Certificate Management Protocol (CMP)

A

A messaging protocol used between PKI entities

53
Q

XML Key Management Specification (XKMS)

A

Designed to allow XML-based programs access to PKI services.

54
Q

Secure Multipurpose Internet Mail Extensions (S/MIME)

A
  • A standard used for encrypting email
  • Contains signature data
  • Asymmetric encryption
55
Q

Secure Electronic Transaction (SET)

A

Encryption for credit card numbers

56
Q

SSH Phase 1

A

Secure channel to negotiate the channel connection

57
Q

SSH Phase 2

A

Secure channel used to establish the connection

58
Q

Pretty Good Privacy (PGP)

A

A freeware email encryption system

59
Q

GNU Privacy Guard (GPG)

A

An alternative to PGP

60
Q

IPSec

A

Authentication and encryption across the internet, often used for VPNs

61
Q

The two protocols used by IPSec

A

1) Authentication Header (AH)

2) Encapsulating Security Payload (ESP)

62
Q

Federal Information Processing Standard (FIPS)

A

Used when an existing commercial or governmental system doesn’t meet federal security requirements.

63
Q

Public Key Infrastructure (PKI)

A

A two-key, asymmetric system with four main components:

1) Certificate Authority (CA)
2) Registration Authority (RA)
3) RSA (the encryption algorithm)
4) Digital Certificates

64
Q

Registration Authority (RA)

A

A middleman between a user and a CA

65
Q

Local Registration Authority (LRA)

A

Can be used to identify or establish the identity of an individual for certificate issuance.

66
Q

X.509

A

A standard certificate format supported by the ITU

67
Q

Certificate Policies

A

Define what certificates do.

68
Q

Cross Certification

A

The process of a CA requiring interoperability.

69
Q

Certificate Practice Statement

A

A detailed statement the CA uses to issue certificates and implement its policies.

70
Q

Bridge Trust Model

A

A peer-to-peer relationship exists among the root CAs

71
Q

Mesh Trust Model

A

Supports multiple paths and multiple root CAs

72
Q

BitLocker

A

A full disk encryption feature that can encrypt an entire volume with 128-bit encryption.