Cryptographic Flashcards

(12 cards)

1
Q

Cryptographic

A

Science of protecting information by transforming it into a
secure format. It ensures that data is kept confidential, authentic,
andsafe from tampering or theft—especially when stored or
transmitted across networks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Purpose of cryptographic techniques

A

To protect data at rest and in transit

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Cryptographic Techniques

A
  • Ciphers
  • Symmetric Encryption
  • Asymmetric Encryption
  • Hash Functions
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Ciphers

A

Algorithms that transform readable text (plaintext) into
unreadable text (ciphertext)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Types of ciphers

A
  • Caesar Cipher: Shifts each letter by a fixed number. Example: ‘HELLO’ →
    ‘KHOOR’ with a shift of 3.
  • Vigenère Cipher: Uses a keyword to vary the shift for each letter. Example:
    Keyword ‘KEY’ encrypts ‘DATA’ to ‘NERK’.
  • Polyalphabetic Cipher: Uses multiple substitution alphabets to obscure
    letter frequency. Example: Vigenère is a type of polyalphabetic cipher.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Symmetric Encryption (AES)

A

Symmetric encryption uses the same key for both encryption and
decryption.
* AES (Advanced Encryption Standard): Encrypts data in blocks. Used in
Wi-Fi security (WPA2/WPA3), cloud storage, and banking systems.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Pros of Symmetric Encryption

A

Fast and efficient. Suitable for large volumes of data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Cons of Symmetric Encryption

A

Key distribution is a challenge: both sender and receiver must
securely share the same key

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Asymmetric Encryption (ECDH, ECDSA, RSA

A

Uses a pair of keys: a public key for encryption and a
private key for decryption.
* RSA: Used for secure data transmission and digital signatures. Example:
Verifying software authenticity.
* ECDH (Elliptic Curve Diffie–Hellman): Used for secure key exchange. Example:
Messaging apps like Signal use ECDH to establish secure sessions.
* ECDSA (Elliptic Curve Digital Signature Algorithm): Verifies authenticity of digital
messages. Example: Blockchain transactions use ECDSA for signature
verification.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Pros of Asymmetric Encryption

A

Solves the key distribution problem. Enables digital signatures and
secure key exchange

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Cons of Asymmetric Encryption

A

Slower than symmetric encryption. More computationally
intensive

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Hashing Functions

A

Hashing functions convert data into a fixed-length string (hash) that
represents the original data. Hashing is one-way and cannot be reversed to the original data
* SHA-256: Common hashing algorithm used for password storage and
data integrity.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly