Cryptography, Blockchain, & Cybersecurity Study Guide

0.0(0)
studied byStudied by 0 people
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/25

flashcard set

Earn XP

Description and Tags

Flashcards for review.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

26 Terms

1
New cards

Hash Functions

One-way, deterministic, fixed-length output used for passwords, data integrity, digital signatures, and blockchain.

2
New cards

Pre-image resistance

A property of hash functions that makes it hard to find an input that produces a specific hash output.

3
New cards

Collision resistance

A property of hash functions that makes it hard to find two different inputs that produce the same hash output.

4
New cards

Rainbow Tables

An attack on password hasing that can be defeated by salting.

5
New cards

One-Time Pad (OTP)

A symmetric cipher that provides perfect secrecy if used correctly; vulnerable if the key is reused.

6
New cards

Stream Cipher

A symmetric cipher based on a Pseudo-Random Generator (PRG); secure if the PRG is unpredictable.

7
New cards

Block Ciphers

Ciphers that encrypt data in fixed-size blocks.

8
New cards

Data Encryption Standard (DES)

A 64-bit block cipher using a 56-bit key and a Feistel network.

9
New cards

Advanced Encryption Standard (AES)

A modern symmetric encryption standard with 128/192/256-bit keys.

10
New cards

Electronic Codebook (ECB)

A block cipher mode that is insecure and deterministic.

11
New cards

Cipher Block Chaining (CBC)

A block cipher mode that uses an Initialization Vector (IV) and is good for confidentiality.

12
New cards

Counter (CTR)

A block cipher mode that turns a block cipher into a stream cipher.

13
New cards

RSA

An asymmetric encryption algorithm.

14
New cards

Diffie-Hellman Key Exchange

A key exchange protocol that allows two parties to establish a shared secret key over an insecure channel.

15
New cards

Entropy

A measure of randomness; high entropy leads to more randomness.

16
New cards

Secure PRNG

Unpredictable, deterministic, seeded from entropy and has no bias.

17
New cards

Blockchain

A data structure consisting of blocks, where each block contains data, a timestamp, the previous hash, and a nonce.

18
New cards

Proof of Work (PoW)

A consensus mechanism that is energy-intensive and uses hash puzzles.

19
New cards

Ripple Protocol Consensus Algorithm (RPCA)

A consensus mechanism where Unique Node Lists (UNLs) vote in rounds, requiring 80% agreement.

20
New cards

Message Authentication Code (MAC)

Provides integrity and authentication.

21
New cards

CBC-MAC

Message Authentication Code based on Cipher Block Chaining, not secure for variable-length messages.

22
New cards

CMAC

A secure MAC that uses a separate key for the last block.

23
New cards

Vulnerability Management Lifecycle

Discovery → Assessment → Prioritization → Remediation → Verification.

24
New cards

Weak AI

Also known as Machine Learning (ML).

25
New cards

Biometrics

Security mechanism using fingerprint scanners or other methods. Use MFA, educate users, gain consent, encrypt biometric data.

26
New cards

Maritime Cybersecurity Threats

GPS spoofing/jamming, Bridge system hijacking, Ransomware at ports, Compromised supply chains.