What is the purpose of encryption?
Obfuscating the data so a key is required
It is a critical part of the security puzzle.
Define decryption.
Reversal of the scrambling protocol
It allows the original message to be retrieved from the cipher text.
What are the two basic types of cryptography?
Each type has different methods for encrypting and decrypting data.
What is a Caesar Cipher?
A shift cipher
It substitutes letters in the alphabet based on a fixed number of shifts.
What does the ATBASH cipher do?
Substitutes letters in the alphabet
It is a specific type of mono-alphabetic substitution cipher.
What is the main characteristic of XOR in binary operations?
Only reversible binary operation
It can be used for encryption and decryption processes.
What does AES stand for?
Advanced Encryption Standard
It is a widely used symmetric key algorithm that replaced DES.
What is the main problem with symmetric key encryption?
How to transmit the symmetric key
This issue led to the development of public key encryption.
In public key encryption, what are the two types of keys used?
The public key encrypts the message, while the private key decrypts it.
What is a digital signature used for?
Guarantee who sent the message
It ensures nonrepudiation by proving the sender’s identity.
What is the primary characteristic of a hashing algorithm?
One way
You cannot ‘unhash’ something, and it produces a fixed-length output.
What does MD5 refer to?
A hashing algorithm
It is commonly used but has known vulnerabilities.
What is the purpose of salt in hashing?
Random bits added to further secure encryption or hashing
It helps prevent Rainbow Table attacks.
What is a payload in steganography?
The data to be covertly communicated
It is hidden within a carrier signal or data file.
What is cryptanalysis?
The study of analyzing information systems in order to understand hidden aspects of the systems
It includes techniques for breaking encryption.
What is a ciphertext only attack?
An attack where only the ciphertext is available
It is one of the methods used in cryptanalysis.