8. Encryption Flashcards

(16 cards)

1
Q

What is the purpose of encryption?

A

Obfuscating the data so a key is required

It is a critical part of the security puzzle.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Define decryption.

A

Reversal of the scrambling protocol

It allows the original message to be retrieved from the cipher text.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What are the two basic types of cryptography?

A
  • Single/symmetric key encryption
  • Public/asymmetric key encryption

Each type has different methods for encrypting and decrypting data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is a Caesar Cipher?

A

A shift cipher

It substitutes letters in the alphabet based on a fixed number of shifts.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What does the ATBASH cipher do?

A

Substitutes letters in the alphabet

It is a specific type of mono-alphabetic substitution cipher.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is the main characteristic of XOR in binary operations?

A

Only reversible binary operation

It can be used for encryption and decryption processes.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What does AES stand for?

A

Advanced Encryption Standard

It is a widely used symmetric key algorithm that replaced DES.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is the main problem with symmetric key encryption?

A

How to transmit the symmetric key

This issue led to the development of public key encryption.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

In public key encryption, what are the two types of keys used?

A
  • Public key
  • Private key

The public key encrypts the message, while the private key decrypts it.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is a digital signature used for?

A

Guarantee who sent the message

It ensures nonrepudiation by proving the sender’s identity.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is the primary characteristic of a hashing algorithm?

A

One way

You cannot ‘unhash’ something, and it produces a fixed-length output.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What does MD5 refer to?

A

A hashing algorithm

It is commonly used but has known vulnerabilities.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is the purpose of salt in hashing?

A

Random bits added to further secure encryption or hashing

It helps prevent Rainbow Table attacks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is a payload in steganography?

A

The data to be covertly communicated

It is hidden within a carrier signal or data file.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is cryptanalysis?

A

The study of analyzing information systems in order to understand hidden aspects of the systems

It includes techniques for breaking encryption.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is a ciphertext only attack?

A

An attack where only the ciphertext is available

It is one of the methods used in cryptanalysis.