Final Exam Review

studied byStudied by 0 people
0.0(0)
Get a hint
Hint

What is Access Control

1 / 66

encourage image

There's no tags or description

Looks like no one added any tags here yet for you.

67 Terms

1

What is Access Control

Ensures that resources are only granted to those users who are entitled to them

New cards
2

What is Encryption

The process of converting plaintext data into an unreadable format (ciphertext) to prevent unauthorized access.

New cards
3

What is Decryption

The process of converting ciphertext back into its original format (plaintext).

New cards
4

What is Authentication

The process of verifying the identity of a user, device or system.

New cards
5

What is a threat in computer security?

An action or event that might compromise security.

New cards
6

What are some basic problems and concerns involving cryptographic systems?

Weak encryption, improper key management, inadequate randomness, inadequate authentication.

New cards
7

What is Plaintext?

The original, readable message that is input into the encryption process.

New cards
8

What is Ciphertext?

The scrambled, unreadable message that results from the encryption process.

New cards
9

What is a Cipher?

The algorithm used for transforming plaintext to ciphertext.

New cards
10

What are the pros of classical cryptographic techniques?

Simple, can be done manually, protect plaintext f4rom casual snooping.

New cards
11

What are the cons of classical cryptographic technique?

Limited security, vulnerable to frequency analysis and brut-force attacks, challenging key management.

New cards
12

How does the Caesar Cipher work?

By shifting the letters in the plaintext message by a certain number of positions, known as the “shift” or “key”.

New cards
13

What is Symmetric Encryption?

A form of cryptosystem in which encryption and decryption are performed using the same key.

New cards
14

Compare Symmetric and Asymmetric Cryptography

Symmetric uses a single key for encryption and decryption; asymmetric uses a pair of keys (public and private).

New cards
15

What are Hash Functions?

Algorithms that calculate a fixed length hash value form plaintext, making it impossible to recover the contents of the plaintext.

New cards
16

What was the first recorded use of cryptography for correspondence?

The Spartans’ use of the scytale.

New cards
17

What is the Enigma machine?

A cipher device used extensively by Nazi Germany during World War II to protect communication.

New cards
18

What is the Hebern cipher machine?

A typewriter-like device with 26 letters that light up, scrambling the electrical signal between the letters of the keyboard and the light panel.

New cards
19

What can lead to a break in good encryption schemes?

Using weak algorithms, improper key management, using vulnerable algorithms, and incorrect implementation of strong algorithms.

New cards
20

What is divisibility in mathematics?

If a and b are integers, with a not equaling 0, a divides b if there exists an integer q such that b = a q.

New cards
21

What is Modular Arithmetic?

A system of arithmetic for integers, where numbers wrap around upon reaching a certain value, called the modulus.

New cards
22

How do you apply the Euclidean Algorithm to find the GCD?

Using repeated division: GCD (A,B) = GCD (B,R) where R is the remainder when A is divided by B.

New cards
23

What is a prime number?

A natural number greater than 1 that has no positive divisors other than 1 and itself.

New cards
24

What is Euler’s Totient Function?

The number of positive integers less than or equal to a given integer that are relatively prime to it.

New cards
25

What are Stream Ciphers?

They encrypt plaintext one bit or byte at a time, suitable for varying data lengths and fast encryption/decryption.

New cards
26

What are Block Ciphers?

They encrypt data in fixed-size blocks, allowing for secure decryption, and has similar encryption and decryption operations.

New cards
27

Why is a Feistel cipher superior to a full permutation block cipher?

It is guaranteed to be invertible, allowing for secure decryption, and has similar encryption and decryption operations.

New cards
28

What are the parts of a Feistel cipher that give it security?

Round function, invertibility, and key schedule.

New cards
29

How does the Data Encryption Standard (DES) work?

Through initial permutation, 16 rounds of processing, and a final permutation, incorporating substitution and transposition.

New cards
30

What is the Advanced Encryption Standard (AES)?

A block cipher that encrypts data in 128-bit blocks using key lengths of 128, 192, or 256 bits.

New cards
31

What is Electronic Code Book (ECB) mode?

A block cipher mode that directly encrypts each block of input plaintext into blocks of encrypted ciphertext.

New cards
32

What is Cipher Block Chaining (CBC) mode?

An advancement on ECB where the previous cipher block is XORed with the next plaintext block before encryption.

New cards
33

What is a meet-in-the-middle attack?

A cryptanalytic attack that divides the key space into two parts and encrypts plaintext while decrypting ciphertext to find a match.

New cards
34

What is the difference between TRNGs, PRNGs, and CSPRNGs?

TRNGs generate numbers from physical processes, PRNGs use deterministic algorithms, and CSPRNGs are secure PRNGs suitable for cryptography.

New cards
35

What is Symmetric Key Encryption?

It uses the same key for both encryption and decryption.

New cards
36

What is Public Key Encryption?

It uses a pair of keys, a public key and a private key, for encryption and decryption.

New cards
37

How does RSA encryption work?

One party generates a key pair, uses the public key for encryption, and the private key for decryption.

New cards
38

How does Diffie-Hellman key exchange work?

Both parties exchange public key information to arrive at a shared secret key.

New cards
39

What is Elliptical Curve Cryptography (ECC)?

A public-key cryptography approach based on the algebraic structure of elliptic curves over finite fields.

New cards
40

What are has functions used for?

To ensure data integrity, generate checksums, and create secure hash algorithms in cryptographic applications.

New cards
41

What is a cryptographic hash function?

A transformation that takes an input and returns a fixed-sizing string of bytes unique to each unique input.

New cards
42

What properties should a good cryptographic hash function have?

Preimiage resistance, second preimage resistance resistance, and collision resistance.

New cards
43

What is a hash function collision?

When two different inputs result in the same output.

New cards
44

What are some good hashing algorithms?

SHA-256 and SHA-3

New cards
45

What is a Message Authentication Code (MAC)?

A code used to authenticate the origin and integrity of a message.

New cards
46

What are Digital Signatures

Digital signatures ensure the authenticity and integrity of a message, software, or digital document.

New cards
47

How do you verify a digital signature?

By decrypting the signature with the sender’s public key and comparing it to the hash of the received message.

New cards
48

What is Public Key Infrastructure (PIK)?

A system for creation, storage, distribution, and revocation of digital certificates.

New cards
49

What is a Certificate Authority (CA)?

An entity that issues digital certificates for use by other parties.

New cards
50

How are keys managed in cryptographic systems?

Through generation, distribution, storage, and destruction, with secure protocols.

New cards
51

What is a Bitcoin Block?

A file where data related to transactions are permanently recorded.

New cards
52

What sets the limit on the size of the Bitcoin block?

Blocksize.

New cards
53

What is included in the Block Header of a Bitcoin block?

Version, Previous Block Hash, Merkle Root, Timestamp, Difficulty, Target, Nonce, and Transaction Counter.

New cards
54

What is the Previous Block Hash?

An encrypted number of previous block’s header.

New cards
55

What is the Merkle root?

An encrypted number of transactions in the Merkle tree of the current block.

New cards
56

What does the Timestamp in a Bitcoin block signify?

It places the block in the blockchain.

New cards
57

What is the Difficulty Target in a Bitcoin block?

The difficulty rating of the target encrypted number, signifying the difficulty in generating an encrypted number that is equal to or less than target.

New cards
58

What is the Nonce in a Bitcoin block?

A number that the miner increases incrementally when encrypting.

New cards
59

What is the Transaction Counter in a Bitcoin block?

A field that lists the number of transactions stored in the block.

New cards
60

What are Transactions in a Bitcoin block?

A list of all the transactions within a block.

New cards
61

What is Bitcoin mining?

The process by which transactions are officially entered on the blockchain.

New cards
62

What are the steps involved in Bitcoin mining?

Transaction Verification, Hashing, Finding the Hash, Block Addition.

New cards
63

What happens during Transaction Verification in Bitcoin mining?

When a transaction is made between wallets, the addresses and amount are entered into a block on the blockchain.

New cards
64

What is Hashing in Bitcoin mining?

The block is assigned some information, and all of the data in the block is put through cryptographic algorithm.

New cards
65

What is Finding the Hash in Bitcoin mining?

Miners compete to find a hash that is equal to or less than a number set by the Bitcoin network’s difficulty algorithm.

New cards
66

What happens during Block Addition in Bitcoin mining?

The first miner to find the solution to the problem receives bitcoins as a reward, and the process begins again.

New cards
67

What do miners need for Bitcoin mining?

Substantial hardware and software, such as GPU or an ASIC.

New cards

Explore top notes

note Note
studied byStudied by 23 people
Updated ... ago
5.0 Stars(2)
note Note
studied byStudied by 41 people
Updated ... ago
5.0 Stars(1)
note Note
studied byStudied by 11 people
Updated ... ago
5.0 Stars(1)
note Note
studied byStudied by 46 people
Updated ... ago
4.0 Stars(1)
note Note
studied byStudied by 91 people
Updated ... ago
5.0 Stars(1)
note Note
studied byStudied by 9 people
Updated ... ago
5.0 Stars(1)
note Note
studied byStudied by 26 people
Updated ... ago
5.0 Stars(1)
note Note
studied byStudied by 30060 people
Updated ... ago
4.4 Stars(24)

Explore top flashcards

flashcards Flashcard36 terms
studied byStudied by 9 people
Updated ... ago
5.0 Stars(1)
flashcards Flashcard117 terms
studied byStudied by 66 people
Updated ... ago
5.0 Stars(1)
flashcards Flashcard27 terms
studied byStudied by 16 people
Updated ... ago
5.0 Stars(1)
flashcards Flashcard103 terms
studied byStudied by 16 people
Updated ... ago
5.0 Stars(1)
flashcards Flashcard47 terms
studied byStudied by 7 people
Updated ... ago
5.0 Stars(1)
flashcards Flashcard29 terms
studied byStudied by 15 people
Updated ... ago
5.0 Stars(1)
flashcards Flashcard46 terms
studied byStudied by 4 people
Updated ... ago
5.0 Stars(1)
flashcards Flashcard40 terms
studied byStudied by 65 people
Updated ... ago
5.0 Stars(1)