Cryptography Additional Study

0.0(0)
Studied by 0 people
call kaiCall Kai
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
GameKnowt Play
Card Sorting

1/185

encourage image

There's no tags or description

Looks like no tags are added yet.

Last updated 12:24 AM on 5/20/26
Name
Mastery
Learn
Test
Matching
Spaced
Call with Kai

No analytics yet

Send a link to your students to track their progress

186 Terms

1
New cards

The hash value in bits for MD5 is ____.

128

2
New cards

____ (DSA). _____ (___), for digital signatures, based on the mathematical concept of modular exponentiation and the discrete logarithm problem. (symmetric/asymmetric?)

Digital Signature Algorithm. Federal Information Processing Standard (FIPS 186). Asymmetric.

3
New cards

ECC is (symmetric/asymmetric)?

Asymmetric

4
New cards

WPA2 IV size is ___ bits

48

5
New cards

WPA cipher type?

Symmetric stream

6
New cards

WPA2 cipher type?

Symmetric Block

7
New cards

WEP cipher type?

Symmetric Stream

8
New cards

The A5/3 encryption system – AKA _____ – the Japanese word for “_____”

KASUMI, mist

9
New cards

With WPA Enterprise, no _____ key is used, and it also includes a _____. Which mainly guards against the bit flipping attacks identified within WEP.

pre-shared key, MIC (Message Integrity Check)

10
New cards

Time Resetting

Used to crack ciphers. Some encryption schemes use the time of the computer to create the key. Resetting this time or determining the time that the message was created can give some useful information to the intruder.

11
New cards

Active Attack

Used to crack ciphers. Where the intruder inserts or modifies messages.

12
New cards

In Transport Mode with Encapsulating Security Payload (ESP) the _____ is added for routing.

Original IP Header

13
New cards

In Tunnel Mode with Encapsulating Security Payload (ESP) the ______ is added for routing.

New IP Header

14
New cards

With _____, the user authenticates themselves to the end service, and with _____, only part of the conversation between the entities is authenticated.

end-to-end authentication, intermediate authentication

15
New cards

4 steps for obtaining a digital certificate signed by a Certificate Authority (CA):

Step 1: Requester generates a key-pair (one public, one private). Public key is provided to the CA.

Step 2: Requester creates and submits a Certificate Signing Request (CSR), along with requester’s public key to the CA.

Step 3: CA generates the digital certificate for the requester.

Step 4: CA signs the requester’s digital certificate with the CA’s own private key, and issues certificate to requester.

16
New cards

PKCS #8

Private Key Format. Sealing private keys.

17
New cards

PKCS #3

Key exchange. Sending a secret letter.

18
New cards

PKCS #1

RSA keys. Your master key.

19
New cards

PKCS #10

A standard format used for requesting digital certificates from certificate authorities.

20
New cards

PKCS #12

Used to bundle a private key with its X.509 certificate or to bundle all the members of a chain of trust. .p12 files

21
New cards

DHE_EXPORT Downgrade attack

Effects Diffie-Hellman, involves forcing the key negotiation process to default to 512-bit prime numbers. The precomputation of 512-bit keys with g values of 2 and 5 are within a reasonable time limit.

Combat: Disabling Export Cipher Suites, Using (Ephemeral) Elliptic-Curve Diffie-Hellman (ECDHE), Use a strong group.

22
New cards

Ephemeral Keys

A different key is used for each connection. The leakage of any long-term key would not cause all the associated session keys to be breached.

23
New cards

Message sending using public key cryptography w/ Hashing

knowt flashcard image
24
New cards

The main advantages of Elliptic Curve methods vs RSA are:

Much smaller keys. Much smaller than in RSA. This considerably speeds up the encryption process.

Creation of the curves are more difficult than generating prime numbers, which makes it more difficult to crack than RSA.

They can be used to factorize values, such as finding the prime number factors within RSA.

25
New cards

Hashing involves taking a _____ length input and producing a _____ length output (message digest).

variable; fixed

26
New cards

The hash value in bits for SHA-1 is ____.

160

27
New cards

The hash value in bits for MD4 is ____.

128

28
New cards

IPSec ______ mode involves \end-to-end\ encryption; i.e. data remains encrypted from the time it leaves a sender's device to the time it arrives at the receiver's device.

Transport

29
New cards

IPSec ______ mode involves encryption from gateway to gateway, i.e. just through the public network space.

Tunnel

30
New cards

A security analyst on a local network using monitoring tools is likely to only be able to read contents of traffic encrypted using IPSec ______ mode.

Tunnel

Remember, with tunnel mode, encryption does not happen until just before it leaves the local network. Traffic likely remains unencrypted between the end user device and the local network boundary.

31
New cards

_____ is a lightweight cryptography method for signing messages (MAC). It boasts a relatively undemanding hardware implementation (only ~3,333 gates required at 1MHz clock rate) making it suitable for IoT implementation.

Chaskey

32
New cards

Chaskey has a key size of _____ bits.

128

33
New cards

A weakness of one-way hashing is that the same piece of plaintext will result in the same ciphertext unless _____ is applied.

salt

34
New cards

The minimum recommended key size to use with RC4 is _____ bits.

40

35
New cards

RC4 is a symmetric stream cipher with a variable key size up to a max of _____ bits.

2048

36
New cards

_____ has a block size of 64 bits, key size of 56 bits, and 16 rounds of substitution & transposition.

Data Encryption Standard (DES)

37
New cards

A(n) _____ is a collection of precomputed hash values of actual plaintext passwords used for password cracking.

rainbow table

38
New cards

_____ is a common x.509 certificate file type that is used with both PEM and DER formats.

.cer

39
New cards

_____ has a block size of 64 bits, key size of 112 bits, and 48 rounds of substitution & transposition.

Triple Data Encryption Standard (3DES)

40
New cards

Key sizes used with the Advanced Encryption Standard (AES) include _____. _____, or _____.

128, 192, 256

41
New cards

The Advanced Encryption Standard (AES) operates using _____ bit blocks.

128

42
New cards

Skipjack is a symmetric block cipher that uses a ______ bit key.

80

43
New cards

Enocoro operates with a key size of ______ bits and an initialization vector (IV) of _____ bits.

128-bit key size; 64-bit IV

44
New cards

Skipjack has a block size of _____bits.

64

45
New cards

PHOTON, SPONGENT, Lesamnta-LW, and Quark are examples of light-weight _____.

Light-weight hashing algorithms

46
New cards

_____ has a block size of 64 bits, key size of 128 bits, and >17 rounds of substitution & transposition.

IDEA

47
New cards

_______ is an _____ partially ______ crypto system that leverages ____ number characteristics, operates with a 1024-4096 bit variable key size, and 1 round.

RSA, asymmetric, homomorphic, prime

48
New cards

Blowfish and Twofish are both _____ ciphers with common key sizes of 128, 192, or 256 bits.

Symmetric Block

49
New cards

RC5 is a (symmetric/asymmetric?) block cipher that uses block sizes of ___, ___, or ___ bits and boasts a variable key size up to ____ bits.

Symmetric, 32, 64, or 128 block sizes, 2048 bit key size

50
New cards

Quark produces a hash value of ____ or ____bits.

64 or 112

51
New cards

The block size used with XTEA is _____ bits.

64

52
New cards

The key size used with XTEA is _____ bits. ___ speed.

128, Fast.

53
New cards

Camelia is a _____.

Symmetric block cipher

54
New cards

RC6 can best be described as a _____.

Symmetric Block Cipher

55
New cards

RC2 has a block size of 64 bits and variable key size up to 128 bits. What is the minimum recommended key size to use when employing RC2?

40

56
New cards

The light-weight symmetric steam cipher Mickey v2 operates with a key size of ______ bits and an initialization vector (IV) variable up to _____ bits.

80; 80

57
New cards

RC4 is a(n) _____.

Symmetric stream cipher

58
New cards

An entity seeking to obtain a digital certificate must generate and submit a _____ request to a certificate authority to request the certificate.

certificate signing request (CSR)

59
New cards

ChaCha is a(n) _____.

Symmetric stream cipher

60
New cards

RSA and DSA are both_____.

Asymmetric algorithms

61
New cards

_____ provides a method for key exchange using a one-way function.

Diffie-Hellman

62
New cards

_____ is a Lightweight cryptography method for signing messages (MAC).

Chaskey

63
New cards

WEP uses encryption method ___ with a ___-bit key size.

RC4, 40

64
New cards

An entity seeking to obtain a digital certificate must first generate a _____ for themselves.

asymmetric key pair

65
New cards

WPA uses encryption method ____ + ____ with a _____-bit key size.

TKIP + RC4, 128

66
New cards

Wi-Fi Protected Access 2 (WPA2) uses encryption method ____ with a ____ -bit key size.

AES-CCMP, 128

67
New cards

_____ substitution is where a single mapping from our alphabet to a cipher alphabet is created.

Mono-alphabetic

68
New cards

What step will a certificate authority (CA) take after generating a digital certificate for a requester, but before issuing the certificate to that requester?

Sign the certificate with the CA's own private key

69
New cards

_______ refers to the mapping of our alphabet to a number of cipher alphabets.

Polyalphabetic

70
New cards

_____ is considered to be unbreakable since it only uses its cipher code once.

One-time pad

71
New cards

_____ encoding involves 8-bit values and supports up to 256 characters.

ASCII

72
New cards

A _____ occurs when two different input values produce the same hash signature.

collision

73
New cards

_____ is an encoding method with 16-bit values and supports up to 65,536 characters.

UTF-16

74
New cards

The light-weight symmetric stream cipher Trivium operates with a key size of ______ bits and an initialization vector (IV) of _____ bits.

80; 80

75
New cards

A _____ is a tamper-evident and intrusion-resistant physical device that safeguards and manages cryptographic keys and provides cryptographic processing.

hardware security module (HSM)

76
New cards

A _____ is a dedicated processor that handles hardware-level encryption; allows the use of full disk encryption on a hard drive in a manner that minimizes the impact on system performance.

trusted platform module (TPM)

77
New cards

_____ is a message authentication code (MAC) that can be used to verify the integrity and authentication of the message. It involves hashing the message with a secret key, and thus differs from standard hashing, which is purely a one-way function.

HMAC

78
New cards

_____ ciphers make use of a single secret key for both encryption and decryption.

Symmetric

79
New cards

Solve by applying the binary XOR function. 1 1 0 1 1 / 1 0 0 0 0

01011

80
New cards

Solve by applying the binary AND function. 11011 / 10000

10000

81
New cards

Solve by applying the binary OR function. 11011 / 10000

11011

82
New cards

15 mod 7 = _____

1

83
New cards

12 mod 7 = _____

5

84
New cards

The two types of symmetric ciphers are _____ and _____

Block, Stream

85
New cards

When encrypting data using asymmetric cryptography, which key should be shared or distributed to facilitate decryption?

Public key

86
New cards

_____ are used to manage how blocks of data are processed in symmetric encryption.

Block cipher modes

87
New cards

Which symmetric block cipher modes enable the block cipher to operate like a stream cipher?

CFB, OFB, CTR

88
New cards

Symmetric block ciphers make use of _____ to perform substitution as part the encryption process.

S-boxes

89
New cards

PRESENT is a light-weight symmetric block cipher with a key size of ___ or ___ bits, ___ rounds, and ___ bit block size.

80 or 128, 32 rounds, 64

90
New cards

______ cryptography makes use of a key pair (one public, one private) to perform encryption and decryption. If a given key in a key pair is used for encryption, only the opposite key in that key pair can perform the reverse decryption.

Asymmetric

91
New cards

When encrypting data using symmetric cryptography, which key may need to be exchanged to facilitate decryption?

Secret key

92
New cards

What is the block and key size in bits used by the light-weight symmetric block cipher CLEFIA?

128 bit blocks; 128, 192, or 256 bit keys

93
New cards

If Shawn employs public key cryptography to send Sue a digitally signed message, which key will Sue use to decrypt the message?

Sue's private key

94
New cards

_____ is a public key encryption method that is an extension of El Gamal but adds a one-way hashing method which protects against an adaptive chosen ciphertext attack.

Cramer-Shoup

95
New cards

With _____ encryption, we can perform mathematical operations on ciphered values i.e., before decryption.

Homomorphic

96
New cards

_____ allows for a new unique passcode to be created for each instance, based on an initial seed and for a given time period.

TOTP

97
New cards

Which encoding scheme for x.509 certificates supports Base64 and ASCII formats?

PEM

98
New cards

If Shawn plans to employ asymmetric cryptography to send Sue a digitally signed message, which key will Shawn use to sign the message?

Shawn's private key

99
New cards

If Shawn employs public key cryptography to send Sue a digitally signed message, which key will Sue use to verify the message?

Shawn's public key

100
New cards

Rabbit, Mickey v2, Trivium, Grain, and Enocoro are examples of light-weight _____ ciphers.

symmetric stream