1/26
Looks like no tags are added yet.
Name | Mastery | Learn | Test | Matching | Spaced | Call with Kai |
|---|
No analytics yet
Send a link to your students to track their progress
Cryptography is the art and science of hiding information using __________ and _________ means
mathematical and computational
Who uses cryptography and for what purpose
any person or organization who wants to keep something confidential
a _____ is one of the simplest and easiest forms of cryptography, and is a code that’s used to transform language
cipher
using logic and analysis techniques to break codes is known as __________
cryptanalysis
transforming information such that is hidden, but can still be decoded, is referred to as _______
encryption
cryptography protects us against _______ & ________ threats in the CIA triad
confidentiality and integrity
data exists in three states, what are the three states?
data at rest, data in transit, and data in use
whats an example of data at rest
information sitting in a database
whats an example of data in transit
sending emails to your teacher
whats an example of data in use
powerpoints
what are the two types of encryption and how many keys do they use
symmetric uses one key and asymmetric uses two keys
what is the most common symmetric encryption algorithm (hint. ends in s, so it’s symmetric)
AES
________ is the practice of concealing information in an image or object (hint. rawr)
steganography
symmetric encryption is typically used to store data at _______
rest
the most common asymmetric encryption algorithm is _______ (hint. ends in a, asymmetric)
RSA
asymmetric encryption is typically used to store data in ________
transit
how does asymmetric encryption work
the sender creates and encrypts a message using the recipient’s public key and then the recipient decrypts the message using the recipients private key
a _____, also known as a checksum, is a ________ function
hash, one-way
the avalanche effect is best described as a ___________________________-
a change to the data that drastically changes the output of the hash
why do i want a fingerprint of data
to validate files and identities
the most common hashing algorithm is ________ (ends in ha, hashing)
SHA-256
how are passwords stored and checked in a database
they compare the users password to date stored in their database and they never keep their password in plain text
random data added to a password prior to hashing is known as a ______
salt
what are the three cryptographic attacks?
dictionary attack, rainbow table attack, and collision attack
what is a dictionary attack
an attack where a common wordlist of passwords are used to guess passwords
what is a rainbow table attack
where it uses a precomputed list of common passwords that’ve been run through a hashing algorithm, it then compares password hashes against that table
what is a collision attack
when you manipulate a file to make it have the same hash as another file