COMP607 Week 2 - Basic cryptography

0.0(0)
studied byStudied by 0 people
0.0(0)
full-widthCall Kai
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
GameKnowt Play
Card Sorting

1/77

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

78 Terms

1
New cards

What is cryptography?

The practice of transforming information so that it cannot be understood by unauthorized parties.

2
New cards

What is steganography?

The practice of hiding the existence of information, often by embedding it in harmless files like images or audio.

3
New cards

What is the difference between plaintext and ciphertext?

Plaintext is unencrypted data, while ciphertext is the scrambled and unreadable output of encryption.

4
New cards

What does decryption do?

It changes a secret message back to its original form.

5
New cards

What are the security requirements in cryptography represented by CIA & RAF?

Confidentiality, Integrity, Authenticity, Non-repudiation, Availability, and Freshness.

6
New cards

What is Kerckhoffs's Principle?

A cryptosystem should remain secure even if the attacker knows all details about the system except for the secret key.

7
New cards

What are symmetric cryptographic schemes?

Algorithms that use the same key for both encryption and decryption.

8
New cards

What is the key space in symmetric cryptography?

The set of all possible keys that can be used in the cryptographic process.

9
New cards

What is the role of Alice and Bob in symmetric cryptography?

They represent two parties communicating securely, where Alice encrypts a message and Bob decrypts it.

10
New cards

What is the purpose of cryptography?

To protect the confidentiality, integrity, and authenticity of information.

11
New cards

How does cryptography ensure integrity?

By ensuring that information has not been altered by unauthorized persons or malicious software.

12
New cards

What is an insecure channel?

A communication path where an attacker can eavesdrop, modify, forge, or block messages.

13
New cards

What is the significance of metadata in steganography?

Metadata describes the content or structure of actual data and can be used to hide information.

14
New cards

What is the main advantage of symmetric cryptography?

It allows for secure communication where the ciphertext appears as random bits to unauthorized parties.

15
New cards

What is the process of encryption?

Changing original text into a secret message using cryptographic algorithms.

16
New cards

What does non-repudiation mean in the context of cryptography?

The assurance that the person who created the message cannot deny being the author.

17
New cards

What is the role of adversaries like Eve or Oscar in cryptography?

They represent malicious users who attempt to compromise the security of the communication.

18
New cards

What is the historical significance of cryptography?

It has been used since ancient times, including by figures like Julius Caesar for secure communication.

19
New cards

What is the relationship between cryptography and steganography?

Steganography hides the existence of data, while cryptography transforms data into a secure form.

20
New cards

What is the purpose of using cryptography in banking applications?

To ensure secure transactions and protect sensitive financial information.

21
New cards

What is the meaning of 'freshness' in cryptographic terms?

The assurance that the message received is not a copy of an older message.

22
New cards

What is ciphertext?

The output of encryption, which is scrambled and unreadable.

23
New cards

What is the significance of the key in symmetric cryptography?

It is used for both encryption and decryption processes, ensuring secure communication.

24
New cards

What is the main challenge addressed by cryptography?

To protect information from unauthorized access and manipulation.

25
New cards

What does the term 'cleartext' refer to?

Data that is stored or transmitted without encryption.

26
New cards

What is the primary goal of cryptographic algorithms?

To secure information by transforming it into a format that is unreadable to unauthorized users.

27
New cards

What is the purpose of authentication in cryptography?

To verify the identity of the sender using cryptographic methods.

28
New cards

What does nonrepudiation mean in the context of cryptography?

It prevents an individual from denying their actions, such as sending a message.

29
New cards

How does cryptography provide obfuscation?

By encrypting data to make it unreadable to unauthorized users.

30
New cards

What are the three states of data that cryptography can protect?

Data in processing, data in transit, and data at rest.

31
New cards

What is a limitation of cryptography related to low-power devices?

Low-power devices may require fast response times, impacting the effectiveness of cryptographic protections.

32
New cards

What is a symmetric cryptographic algorithm?

An algorithm that uses the same key for both encryption and decryption.

33
New cards

What is a stream cipher?

A type of symmetric cipher that encrypts data one character at a time.

34
New cards

What is a substitution cipher?

A cipher that replaces one letter or character with another.

35
New cards

What is Caesar's cipher?

A type of substitution cipher that shifts letters a fixed number of places in the alphabet.

36
New cards

What is the encryption method used in a mono-alphabetic substitution cipher?

Each letter is substituted with a different letter according to a specific key.

37
New cards

What is ROT13?

A substitution cipher that rotates the alphabet by 13 places.

38
New cards

What is the Data Encryption Standard (DES)?

A symmetric cipher using a 56-bit key, originally designed in the early 1970s.

39
New cards

What is Triple Data Encryption Standard (3DES)?

An encryption method that applies DES three times for enhanced security.

40
New cards

What is the Advanced Encryption Standard (AES)?

A symmetric cipher approved in 2000, designed to secure data well into the future.

41
New cards

What is a One-Time Pad (OTP)?

A cryptographic method that combines plaintext with a random key to create ciphertext.

42
New cards

How does a hash algorithm function?

It creates a unique digital fingerprint of data that cannot be reversed to reveal the original data.

43
New cards

What is the primary use of hashing in cryptography?

For comparison purposes, to verify data integrity without revealing the original data.

44
New cards

What is the difference between symmetric and asymmetric encryption algorithms?

Symmetric uses a single key for encryption and decryption, while asymmetric uses a pair of keys (public and private).

45
New cards

What is the significance of the key in cryptography?

The key provides the security of the encryption, with its obscurity being crucial for protection.

46
New cards

What is meant by data in transit?

Data that is actively moving across a network, such as during an email transmission.

47
New cards

What is meant by data at rest?

Data that is stored on electronic media and not actively being processed or transmitted.

48
New cards

What is a common example of a stream cipher?

Wired Equivalent Protocol (WEP) used in wireless networks.

49
New cards

What is the function of the XOR cipher?

It uses the binary operation eXclusive OR to encrypt data by comparing two bits.

50
New cards

What does the term 'keyspace' refer to in cryptography?

The total number of possible keys that can be used in an encryption algorithm.

51
New cards

What is the role of the encryption key in Caesar's cipher?

It determines how many positions each letter in the plaintext is shifted.

52
New cards

What is a mono-alphabetic random substitution cipher?

A cipher that substitutes each letter with a different letter based on a random key.

53
New cards

What is the purpose of cryptographic algorithms?

To secure data through various methods of encryption and hashing.

54
New cards

What is the primary purpose of hashing?

Hashing is used primarily for comparison purposes.

55
New cards

What is the nature of hashing in terms of data recovery?

Hashing is a one-way process; its digest cannot be reversed to reveal the original data.

56
New cards

How does hashing relate to ATM security?

An ATM hashes a user's PIN and compares it to the stored hash to grant access.

57
New cards

What characteristic defines a secure hashing algorithm?

A secure hashing algorithm produces a fixed-size digest regardless of the input size.

58
New cards

What happens when a single character in the input data is changed in hashing?

Changing a single character should produce an entirely different digest.

59
New cards

What is a Hashed Message Authentication Code (HMAC)?

HMAC is a hash variation that provides improved security using a secret key possessed by both sender and receiver.

60
New cards

Name one of the most common hash algorithms.

Secure Hash Algorithm (SHA)

61
New cards

What is Message Digest 5 (MD5) designed to address?

MD5 addresses weaknesses found in its predecessor, MD4, and produces a 512-bit hash.

62
New cards

What is the purpose of 'salt' in password hashing?

Salt adds random bit sequences to passwords to make attacks more difficult.

63
New cards

What is the function of a symmetric key in network communications?

Symmetric keys are used for regular periodic communication and require an authentication server.

64
New cards

What is a limitation of symmetric keys for Internet authentication?

Symmetric keys require constant communication between authentication servers for secure access.

65
New cards

What is a 'super' authentication server?

A 'super' AS is a centralized server that facilitates communication between different network ***.

66
New cards

What is the basic principle of asymmetric cryptographic algorithms?

Every user has two keys: a public key that can be shared and a private key that is kept secret.

67
New cards

How do asymmetric keys work in encryption?

A document encrypted with a public key can be decrypted with the corresponding private key and vice versa.

68
New cards

What is the role of Public Key Infrastructure (PKI)?

PKI is used to authenticate users across networks, typically followed by symmetric session keys for communication.

69
New cards

What are the two types of keys used in asymmetric cryptography?

Public key (shared) and private key (kept confidential).

70
New cards

What is the significance of the digest length in hashing?

The digest length remains consistent regardless of the input size, ensuring uniformity.

71
New cards

What is the function of the Race Integrity Primitives Evaluation Message Digest (RIPEMD)?

RIPEMD uses two parallel chains of computation to produce a hash.

72
New cards

What is the purpose of hashing in message integrity?

Hashing helps protect against man-in-the-middle attacks by ensuring data has not been altered.

73
New cards

What is the difference between symmetric and asymmetric cryptography?

Symmetric cryptography uses one key, while asymmetric cryptography uses a pair of keys.

74
New cards

What is the main drawback of using a 'super' authentication server?

It may slow down initial connections and requires registration from networks for inter-communication.

75
New cards

What is the output of hashing a single letter 'a'?

The hash output is 86be7afa339d0fc7cfc785e72f578d33.

76
New cards

What is the output of hashing one million occurrences of 'a'?

The hash output is 4a7f5723f954eba1216c9d8f6320431f.

77
New cards

What is the primary use of password hashes in operating systems?

Password hashes are used to securely store user passwords.

78
New cards

What happens if two different data sets produce the same hash?

This is known as a collision, which indicates a weakness in the hashing algorithm.