Cryptographic Solutions Flashcards

(53 cards)

1
Q

What is the practice of cryptography?

A

The practice and study of writing and solving codes

Cryptography includes techniques like encryption to hide information’s true meaning.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What does encryption do?

A

Converts plaintext to ciphertext

It provides data protection at rest, in transit, and in use.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Define Data at Rest.

A

Inactive data on storage devices

This refers to data that is not actively being used or processed.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Define Data in Transit.

A

Moving across networks

This refers to data actively being transmitted from one location to another.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Define Data in Use.

A

Currently undergoing change

This refers to data that is actively being processed or modified.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is an algorithm in cryptography?

A

Performs encryption or decryption

Algorithms are essential for the cryptographic process.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is a key in cryptography?

A

Essential for determining cipher output

Keys are critical for both encryption and decryption processes.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is key length proportional to?

A

Security

Longer keys generally provide stronger security.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is key rotation?

A

Best practice for security longevity

Regularly changing keys helps maintain security.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is symmetric encryption?

A

Uses same key for encryption and decryption

It is often referred to as private key encryption.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is asymmetric encryption?

A

Uses a pair of keys for encryption and decryption

It is commonly known as public key cryptography.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Name two symmetric algorithms.

A
  • DES
  • AES

These algorithms are widely used for symmetric encryption.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Name two asymmetric algorithms.

A
  • RSA
  • Diffie-Hellman

These algorithms are commonly used for secure key exchange and encryption.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What does hashing do?

A

Converts data into fixed-size string (digest) using hash functions

Hashing is a one-way function that produces a unique output for each unique input.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is a digital certificate?

A

Electronic credentials verifying entity identity for secure communications

Digital certificates are essential for establishing trust in online transactions.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is Public Key Infrastructure (PKI)?

A

Framework managing digital keys and certificates for secure data transfer

PKI is crucial for enabling secure communications over the internet.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

What is a wildcard certificate?

A

Allows multiple subdomains to use the same certificate

This simplifies management and is cost-effective for subdomains.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

What is the purpose of key escrow?

A

Storage of cryptographic keys in a secure, third-party location

Key escrow allows for key retrieval in cases of key loss or legal investigations.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

What is a hash digest?

A

Like a digital fingerprint for the original data

It is always of the same length regardless of the input’s length.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

True or false: Asymmetric encryption requires shared secret keys.

A

FALSE

Asymmetric encryption uses a public and private key pair, eliminating the need for shared secret keys.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

What is the Birthday Attack?

A

Occurs when two different messages result in the same hash digest (collision)

This attack exploits the probability of hash collisions.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

What is salting in hashing?

A

Adds random data to passwords before hashing

Salting ensures distinct hash outputs for the same password.

23
Q

What does HMAC stand for?

A

Hash-based Message Authentication Code

HMAC checks message integrity and authenticity using hashing algorithms.

24
Q

What is the role of a Certificate Authority (CA)?

A

Trusted third party that issues digital certificates

CAs validate and manage certificates, ensuring trust in digital communications.

25
What is **tokenization**?
Obfuscation technique that replaces sensitive data with non-sensitive equivalents ## Footnote Tokenization helps protect sensitive information in databases.
26
What is a **stream cipher**?
Encrypts data bit-by-bit or byte-by-byte in a continuous stream ## Footnote Stream ciphers are often used in real-time communication data streams.
27
What is a **block cipher**?
Breaks input data into fixed-size blocks before encryption ## Footnote Block ciphers are typically used for secure data encryption.
28
What is **key stretching**?
Technique that creates longer, more secure keys ## Footnote Key stretching increases the time needed to crack the key.
29
What is **non-repudiation**?
Ensures that a sender cannot deny sending a message ## Footnote This is achieved through digital signatures.
30
What is **quantum computing** in relation to cryptography?
Threat to traditional cryptographic algorithms ## Footnote Quantum computing could potentially break many current encryption methods.
31
What is a **Certificate Authority (CA)**?
* Trusted third party that issues digital certificates * Certificates contain CA's information and digital signature * Validates and manages certificates ## Footnote CAs play a crucial role in establishing trust in digital communications.
32
What is the role of a **Registration Authority (RA)**?
* Requests identifying information from the user * Forwards certificate request to CA * Collects user information for certificates * Assists in the certificate issuance process ## Footnote RAs act as intermediaries between users and CAs.
33
What is a **Certificate Signing Request (CSR)**?
* A block of encoded text with information about the entity requesting the certificate * Includes the public key * Submitted to CA for certificate issuance * Private key remains secure with the requester ## Footnote CSRs are essential for the creation of digital certificates.
34
What is a **Certificate Revocation List (CRL)**?
* Maintained by CAs * List of all digital certificates that the CA has revoked * Checked before validating a certificate ## Footnote CRLs help ensure that only valid certificates are trusted.
35
What does **Online Certificate Status Protocol (OCSP)** do?
* Determines certificate revocation status using the certificate's serial number * Faster but less secure than CRL ## Footnote OCSP provides real-time verification of certificate validity.
36
What is **OCSP Stapling**?
* Alternative to OCSP * Allows the certificate holder to get the OCSP record from the server at regular intervals * Includes OCSP record in the SSL/TLS handshake * Speeds up the secure tunnel creation ## Footnote OCSP Stapling enhances performance and security in certificate validation.
37
What is the purpose of **Public Key Pinning**?
* Resists impersonation attacks from fraudulent certificates * Presents trusted public keys to browsers * Alerts users if a fraudulent certificate is detected ## Footnote Public Key Pinning enhances security for HTTPS websites.
38
What do **Key Escrow Agents** do?
* Securely store copies of private keys * Ensures key recovery in case of loss * Requires strong access controls ## Footnote Key Escrow Agents help manage cryptographic keys securely.
39
What is the function of **Key Recovery Agents**?
* Specialized software that allows restoration of a lost or corrupted key * Acts as a backup for certificate authority keys ## Footnote Key Recovery Agents are crucial for maintaining access to encrypted data.
40
True or false: **Trust** is essential in digital certificates.
TRUE ## Footnote Compromised root CAs can impact all issued certificates, highlighting the importance of trust.
41
What is **blockchain**?
* Shared immutable ledger for transactions and asset tracking * Builds trust and transparency * Widely associated with cryptocurrencies like Bitcoin ## Footnote Blockchain technology underpins many modern digital applications.
42
What is the structure of a **block** in blockchain?
* Previous block's hash * Timestamp * Root transactions (hashes of individual transactions) ## Footnote Each block is linked in chronological order, ensuring data integrity.
43
What is a **Public Ledger**?
* Secure and anonymous record-keeping system * Maintains participants' identities * Tracks cryptocurrency balances * Records all genuine transactions in a network ## Footnote Public ledgers are foundational to blockchain technology.
44
What are **Smart Contracts**?
* Self-executing contracts with code-defined terms * Execute actions automatically when conditions are met * Transparent, tamper-proof, and trust-enhancing ## Footnote Smart contracts automate processes and enhance trust in transactions.
45
What are the **commercial uses** of blockchain?
* Companies like IBM promote blockchain for commercial purposes * Permissioned blockchain used for business transactions * Enhances trust and transparency with immutable public ledger ## Footnote Blockchain applications extend beyond cryptocurrencies into various industries.
46
What does **Supply Chain Management** using blockchain provide?
* Transparency and traceability in the supply chain * Immutable records of product origin, handling, and distribution * Ensures compliance and quality control ## Footnote Blockchain enhances accountability in supply chains.
47
What is a **Trusted Platform Module (TPM)**?
* Dedicated microcontroller for hardware-level security * Protects digital secrets through integrated cryptographic keys * Used in BitLocker drive encryption for Windows devices ## Footnote TPMs add an extra layer of security against software attacks.
48
What is a **Hardware Security Module (HSM)**?
* Physical device for safeguarding and managing digital keys * Ideal for mission-critical scenarios like financial transactions * Performs encryption operations in a tamper-proof environment ## Footnote HSMs ensure key security and regulatory compliance.
49
What is **Tokenization**?
* Substitutes sensitive data with non-sensitive tokens * Original data securely stored elsewhere * Tokens have no intrinsic value ## Footnote Tokenization reduces exposure of sensitive data during transactions.
50
What is **Data Masking**?
* Disguises original data to protect sensitive information * Maintains data authenticity and usability * Used in testing environments ## Footnote Data masking is common in industries handling personal data.
51
What are **Downgrade Attacks**?
* Force systems to use weaker or older cryptographic standards * Exploit known vulnerabilities in outdated versions ## Footnote Downgrade attacks can compromise the security of cryptographic systems.
52
What is the **Quantum Computing Threat**?
* Threat to traditional encryption algorithms (RSA, ECC) * Rapid factorization of large prime numbers ## Footnote Quantum computing poses significant risks to current cryptographic methods.
53
What is **post-quantum cryptography**?
* New cryptographic algorithms resistant to quantum attacks * Aims to create algorithms that can be implemented using classic computers ## Footnote Post-quantum cryptography is essential for future-proofing digital security.