Cybersecurity Midterm

0.0(0)
Studied by 0 people
call kaiCall Kai
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
GameKnowt Play
Card Sorting

1/27

encourage image

There's no tags or description

Looks like no tags are added yet.

Last updated 11:40 PM on 3/12/25
Name
Mastery
Learn
Test
Matching
Spaced
Call with Kai

No analytics yet

Send a link to your students to track their progress

28 Terms

1
New cards
Confidentiality
Ensures that sensitive information remains private and is only accessible to authorized users.
2
New cards
Symmetric Cryptography
Uses the same key for encryption and decryption; faster and used for bulk encryption (e.g., DES, AES).
3
New cards
Asymmetric Cryptography
Uses a public key for encryption and a private key for decryption; used for key exchange and digital signatures (e.g., RSA, Diffie-Hellman).
4
New cards
Confusion
Obscures the relationship between ciphertext and the key, making it difficult to derive the key.
5
New cards
Diffusion
Ensures that changing one bit in plaintext significantly changes the ciphertext, hiding patterns in the plaintext.
6
New cards
Permutation
Rearranges the order of bits without changing their values.
7
New cards
Substitution
Replaces bits or groups of bits with different values to increase security.
8
New cards
Feistel Cipher

A cryptographic structure that alternates substitution and permutation over multiple rounds, dividing plaintext into two halves and applies a function to one half using a subkey before swapping.

9
New cards
DES Algorithm
Symmetric block cipher with a 64-bit block size and a 56-bit key, applying 16 rounds of Feistel structure.
10
New cards

What makes the DES algorithm weak?

Key size is too short, making it vulnerable to brute-force attacks.

11
New cards
Double DES

Uses two rounds of DES but is vulnerable to the Meet-in-the-Middle Attack, which reduces security. Can be broken from the sides.

12
New cards
Triple DES

Utilizes three rounds of DES for increased security but remains vulnerable to the Meet-in-the-Middle Attack.

13
New cards
AES (Advanced Encryption Standard)

Replaced DES due to stronger security and efficiency, with a block size of 128 bits and variable key sizes (128, 192, 256 bits).

14
New cards
Avalanche Effect

Small changes in input drastically change the output of AES encryption.

15
New cards

Steps per round of AES encryption

Byte Substitution (S-Box) – Non-linear transformation.

Shift Rows – Row-wise cyclic shifts.

Mix Columns – Matrix multiplication for diffusion.

Add Round Key – XOR with round key.

16
New cards
ECB (Electronic Codebook)
A mode of block cipher where each block is encrypted independently, insecure for long messages due to repeating patterns.
17
New cards
CBC (Cipher Block Chaining)
A block cipher mode where each block is XORed with the previous ciphertext block before encryption.
18
New cards
CFB (Cipher Feedback)
Converts a block cipher into a self-synchronizing stream cipher.
19
New cards
OFB (Output Feedback)
Generates keystream blocks before XORing with plaintext, preventing error propagation.
20
New cards
CTR (Counter Mode)
Uses a counter instead of feedback, allowing parallel encryption for speed and efficiency.
21
New cards
Stream Ciphers

Encrypts data one bit or byte at a time, requiring a random keystream that must not be reused. Used in real-time communication and wireless encryption.

22
New cards
Block Cipher
Encrypts data in fixed-size blocks (e.g., 64-bit, 128-bit), utilizing structures like Feistel in DES.
23
New cards

Main differences between block and stream ciphers?

Block: Encrypts data in fixed size blocks (64, 128) and uses Feistel structure.

Stream: Encrypts one bit/byte at a time and required a keystream.

24
New cards
Public Key

Developed to solve key distribution problems, utilizing public-private key pairs for security (RSA and Diffie-Hellman).

Applications: Encryption, digital signatures, key exchange.

25
New cards
Trapdoor One-Way Function
Easy to compute in one direction but hard to reverse without the secret key.
26
New cards
Meet-in-the-Middle Attack
An attack that reduces security, particularly against Double DES.
27
New cards

IV (Initialization Vector) Mistakes

Must be unique and unpredictable to ensure the security of encryption.
28
New cards
Padding (PKCS#5)
Ensures plaintext properly fits the block size for encryption.