CYB210: 1,2,3

0.0(0)
Studied by 0 people
call kaiCall Kai
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
GameKnowt Play
Card Sorting

1/49

encourage image

There's no tags or description

Looks like no tags are added yet.

Last updated 7:04 PM on 12/2/25
Name
Mastery
Learn
Test
Matching
Spaced
Call with Kai

No analytics yet

Send a link to your students to track their progress

50 Terms

1
New cards

What are the four security goals of cryptography?

Confidentiality, Integrity, Authentication, Non-repudiation

2
New cards

What is plaintext?

Readable, unencrypted data

3
New cards

What is ciphertext?

Encrypted, unreadable data

4
New cards

What is a cipher?

An algorithm that encrypts/decrypts data

5
New cards

What does the Scytale cipher require?

A rod of specific diameter to read the wrapped message

6
New cards

What alphabet transformation does Atbash use?

Reverses alphabet (A Z, B Y, etc.)

7
New cards

What grid does Tap Code use?

5×5 Polybius Square

8
New cards

What is steganography?

Hiding data inside another file or medium

9
New cards

How many shifts exist in a Caesar cipher?

25 useful shifts

10
New cards

What method breaks Caesar cipher?

Frequency analysis

11
New cards

What improves Vigenère over Caesar?

Multiple shifting values via key

12
New cards

What number does A equal in ROT0?

0

13
New cards

Why does Vigenère still leak information?

Repeating keys create patterns

14
New cards

What reveals Vigenère key length?

Repeated ciphertext sequences

15
New cards

What property prevents “I didn’t do it” claims?

Non-repudiation

16
New cards

What digits does Base16 use?

0–9 and A–F

17
New cards

What does Base64 use for URL-safe encoding?

“-” and “_” instead of “+” and “/”

18
New cards

What are the chunk sizes for Base32 and Base64?

Base32 = 5-bit chunks
Base64 = 6-bit chunks

19
New cards

What symbol is used for padding in Base32/64?

“=”

20
New cards

What does XOR return true for?

Only one input is true

21
New cards

What does modulo (%) give?

The remainder after division

22
New cards

What is true randomness based on?

Physical sources (noise, timing, I/O, etc.)

23
New cards

What is PRNG based on?

Deterministic algorithm (DRBG)

24
New cards

Probability of guessing an 8-bit key?

1/256

25
New cards

What defines a uniform distribution?

All outcomes have equal probability

26
New cards

What does entropy measure?

Uncertainty / unpredictability

27
New cards

Which has higher entropy: fair or biased coin?

Fair coin (1 bit)

28
New cards

What is the key difference between RNG and PRNG?

RNG = real randomness
PRNG = deterministic but appears random

29
New cards

How many possible values in an n-bit key?

2ⁿ

30
New cards

What does probability distribution always sum to?

1

31
New cards

What is the key idea of cryptographic security?

Make attacks computationally infeasible

32
New cards

What is information-theoretic security?

Unbreakable even with infinite resources

33
New cards

Example of information-theoretic security?

One-Time Pad

34
New cards

What is computational security?

Secure because breaking is not feasible in reasonable time

35
New cards

What does (t, ε)-security mean?

Attacker making ≤ t operations has success probability ≤ ε

36
New cards

What does “security in bits” represent?

2ⁿ operations required to break → n-bit security

37
New cards

Why is RSA-2048 not 2048-bit secure?

Security is based on difficulty of factoring, not key size

38
New cards

What does parallelism do to security?

Reduces effective bit-security if attack can be split up

39
New cards

What are precomputation attacks?

Attacks where work is done beforehand (e.g., rainbow tables)

40
New cards

How does more targets affect attack difficulty?

Lowers required operations

41
New cards

How does Moore’s law affect crypto?

Attacks get faster over time, reducing effective security

42
New cards

What is provable security?

Security based on reduction to a known hard problem

43
New cards

What is heuristic security?

Trusted because experts cannot break it

44
New cards

What are common KDFs?

PBKDF2, Scrypt, Argon2

45
New cards

Why use a KDF for passwords?

Slows down attackers; increases brute-force cost

46
New cards

Three ways to generate keys?

Random, KDF (from password), Key agreement

47
New cards

What hard problem does RSA rely on?

Factoring large semiprimes

48
New cards

What is a security margin in crypto design?

Difference between cracked rounds and total rounds

49
New cards

What does a key agreement protocol achieve?

Shared key without transmitting it directly

50
New cards

Symmetric vs asymmetric key main difference?

Symmetric = same key
Asymmetric = public/private pair