cryptography Flashcards

(42 cards)

1
Q

Cryptography is from ___ and ___

A

Kryptos which means hidden
graphein which means to write

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Literally cryptography translates to ___

A

hidden writing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

The use of cryptography can be traced to the ancient ____ and their use of ___

A

Egyptians, hieroglyphs

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

cryptography is used rto create various types of encryption protocols

A
  • 128 and 256-bit encryption
  • Secure Sockets Layer (SSL)
  • Transport Layer Security (TLS)
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

SImplest cryptographic type

A

Symmetric key cryptography

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

sometimes known as “public key” system

A

asymmetric cryptography

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Only the intended recipient can access and read the information, so
conversations and data remain private.

A

Confidentiality

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Cryptography ensures that the encoded data cannot be modified or
tampered with enroute from the sender to the receiver without leaving traceable
marks— an example of this is digital signatures.

A

Integrity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

identities and destinations (or origins) are verified.

A

Authentication

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Senders become accountable for their messages since they
cannot later deny that the message was transmitted

A

Non-repudiation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

early pioneer in the field of cryptography

A

IBM

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

IBM released ___ encryption in the 1960s which became the first ___

A

Lucifer, Data Encryption Standard

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

This simpler form of cryptography takes its name from the fact that both the sender and receiver share one key to encrypt and decrypt information.

A

Symmetric Key Cryptography

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Some examples of this are the Data Encryption Standard (DES) and
Advanced Encryption Standard (AES).

A

Symmetric Key Cryptography

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

A more secure type of cryptography, this involves
both the sender and receiver having two keys: one public and one private.

A

Asymmetric Key Cryptography

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

The ___ algorithm is the most popular form of asymmetric
cryptography.

A

Rivest-Shamir-Adleman

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

These are types of cryptographic algorithms that do not involve the
use of keys. Instead, a hash value is created based on the length of the plain text information and used
to encrypt the data.

A

Hash Functions

18
Q

a number of fixed lengths that acts as a unique
data identifier

19
Q

Symmetric encryption is sometimes called ____ because one single secret key is used to encrypt and decrypt information.

A

secret key cryptography

20
Q

These work on a single byte of data at a time and regularly change
the encryption key.

A

Stream ciphers

21
Q

These work on a single byte of data at a time and regularly change
the encryption key.

A

Block ciphers

22
Q

sometimes referred to as public-key encryption

A

Asymmetric cryptography

23
Q

___ encrypts and decrypts messages using algorithms.

A

Asymmetric key cryptography

24
Q

The first type of asymmetric cryptography to be created, RSA is the basis of
digital signatures and key exchanges, among other things.

A

Rivest-Shamir-Adleman

25
Tha algorithm is based on the principle of factorization
Rivest-Shamir-Adleman
26
Often found in smartphones and on cryptocurrency exchanges, __employs the algebraic structure of elliptic curves to build complex algorithms.
Elliptic Curve Cryptography
27
Built on the principles of modular exponentiations, ___ is the gold standard for verifying electronic signatures and was created by the National Institute of Standards and Technologies.
Digital Signature Algorithm
28
This unique algorithm negates the need for a message recipient to provide their public key to the sender. Instead, a known unique identifier is used by the sender to generate a public key to encode the message.
Identity-based Encryption
29
ATTACKS Keys are a collection of random numbers used with an encryption algorithm to alter and disguise data so that it is incomprehensible to others.
Weak keys
30
ATTACKS Keys need to be used correctly—if they are not, hackers can easily crack them to access the data they are supposed to protect.
Using key incorrectly
31
ATTACKS Like passwords, each key should be unique— using the same key across different systems weakens the ability of cryptography to protect data.
Reusing keys for different purposes
32
ATTACKS keys can be compromised by individuals who legitimately have access to them—such as an employee— and who them sells them on for nefarious purposes.
Insider threats
33
ATTACKS Keys can be compromised by individuals who legitimately have access to them—such as an employee— and who them sells them on for nefarious purposes.
Forgetting the backup
34
ATTACKS Broad attacks that try to randomly guess private keys using the known algorithm.
Brute force
35
ATTACKS These attacks involve a third party intercepting the encrypted message—not the plaintext—and trying to work out the key to decrypt the information, and later, the plaintext.
Ciphertext-only attacks
36
ATTACKS The opposite of a chosen plaintext attack, here, the attacker analyses a section of ciphertext against its corresponding plaintext to discover the key.
Chose ciphertext attack
37
ATTACKS Here, the third party chooses the plaintext for a corresponding ciphertext to begin working out the encryption key.
Chose plaintext attack
38
ATTACKS In this case, the attacker randomly accesses part of the plaintext and part of the ciphertext and begins to figure out the encryption key. This is less useful for modern cryptography as it works best with simple ciphers.
Known plaintext attack
39
ATTACKS In these attacks, the cybercriminal analyses the algorithm to try and work out the encryption key.
Algorithm attacks
40
MITIGATION for example, use unique keys for authentication and digital signatures .
one key for each specific purpose
41
___ is the science of securing information by transforming it into an unreadable format — only reversible by those with the correct key or method.
Cryptography
42