What is the practice of cryptography?
The practice and study of writing and solving codes
Cryptography includes techniques like encryption to hide information’s true meaning.
What does encryption do?
Converts plaintext to ciphertext
It provides data protection at rest, in transit, and in use.
Define Data at Rest.
Inactive data on storage devices
This refers to data that is not actively being used or processed.
Define Data in Transit.
Moving across networks
This refers to data actively being transmitted from one location to another.
Define Data in Use.
Currently undergoing change
This refers to data that is actively being processed or modified.
What is an algorithm in cryptography?
Performs encryption or decryption
Algorithms are essential for the cryptographic process.
What is a key in cryptography?
Essential for determining cipher output
Keys are critical for both encryption and decryption processes.
What is key length proportional to?
Security
Longer keys generally provide stronger security.
What is key rotation?
Best practice for security longevity
Regularly changing keys helps maintain security.
What is symmetric encryption?
Uses same key for encryption and decryption
It is often referred to as private key encryption.
What is asymmetric encryption?
Uses a pair of keys for encryption and decryption
It is commonly known as public key cryptography.
Name two symmetric algorithms.
These algorithms are widely used for symmetric encryption.
Name two asymmetric algorithms.
These algorithms are commonly used for secure key exchange and encryption.
What does hashing do?
Converts data into fixed-size string (digest) using hash functions
Hashing is a one-way function that produces a unique output for each unique input.
What is a digital certificate?
Electronic credentials verifying entity identity for secure communications
Digital certificates are essential for establishing trust in online transactions.
What is Public Key Infrastructure (PKI)?
Framework managing digital keys and certificates for secure data transfer
PKI is crucial for enabling secure communications over the internet.
What is a wildcard certificate?
Allows multiple subdomains to use the same certificate
This simplifies management and is cost-effective for subdomains.
What is the purpose of key escrow?
Storage of cryptographic keys in a secure, third-party location
Key escrow allows for key retrieval in cases of key loss or legal investigations.
What is a hash digest?
Like a digital fingerprint for the original data
It is always of the same length regardless of the input’s length.
True or false: Asymmetric encryption requires shared secret keys.
FALSE
Asymmetric encryption uses a public and private key pair, eliminating the need for shared secret keys.
What is the Birthday Attack?
Occurs when two different messages result in the same hash digest (collision)
This attack exploits the probability of hash collisions.
What is salting in hashing?
Adds random data to passwords before hashing
Salting ensures distinct hash outputs for the same password.
What does HMAC stand for?
Hash-based Message Authentication Code
HMAC checks message integrity and authenticity using hashing algorithms.
What is the role of a Certificate Authority (CA)?
Trusted third party that issues digital certificates
CAs validate and manage certificates, ensuring trust in digital communications.