Crypto Midterm

0.0(0)
studied byStudied by 1 person
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/218

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

219 Terms

1
New cards

Encryption

Converting plaintext into unreadable characters with a key

2
New cards

Decryption

Converting unreadable characters into plaintext with a key

3
New cards

Encryption is _____________

a 2-way function

4
New cards

Hashing

Converting plaintext of any length into a short code

5
New cards

Hashing is _____________

a 1-way function

6
New cards

Can you recover plaintext from a hash?

No

7
New cards

3 Fundamental issues of a currency system?

  1. How to buy original art?

  2. How to sell art from collection?

  3. How to detect stolen art?

8
New cards

In the U.S., our current currency system is......

Fiat

9
New cards

Barter System example

Offering chickens for a yearly newspaper subscription

10
New cards

What is a problem with the Barter System example?

If the newspaper editor doesn't need chicken, but bread instead

11
New cards

What is a solution to the Barter System problem?

Find something that is valuable to everyone (gold)

12
New cards

Why choose gold as a solution to the Barter System?

It's rare, but not too rare

13
New cards

Gold Standard

A monetary system where a country's currency or paper money has value directly linked to gold

14
New cards

What does the fixed price for gold determine?

The value of the currency

15
New cards

If the U.S. sets the price of gold at $500/ounce, the value of the dollar would be...

1/500th of an ounce of gold

16
New cards

Do we currently follow the gold standard?

No, we follow the Fiat system

17
New cards

Fiat System

Monetary system where the value of currency isn't based on a physical commodity, but fluctuates dynamically against other currencies on the foreign-exchange market

18
New cards

Fiat is derived from what word?

Latin fieri- which means an arbitrary act or decree

19
New cards

The value of fiat currencies is based on what?

The fact that they're legal tender by government decree

20
New cards

Is the gold standard currently used by any government?

No

21
New cards

What is officially crowned as the world's reserve currency?

U.S. dollar, backed by the world's largest gold reserves

22
New cards

What WWII agreement crowned the U.S. dollar as the world's reserve currency?

Bretton Woods Agreement

23
New cards

In the U.S., which president ended the Bretton Woods system & began the era of free floating fiat currencies?

Nixon

24
New cards

In a banking system, what role does the bank act as?

A middleman trusted by both parties

25
New cards

What if there is an alternate middleman, instead of a bank, that is fast, automated, transparent, and free from hacking/tampering?

Block chain

26
New cards

Bitcoin

1st cryptocurrency developed based on blockchain technology

27
New cards

Who invented Bitcoin?

Unknown group/person by the name Satoshi Nakamoto

28
New cards

What is a block chain?

A unchangeable, distributed, decentralized ledger in chronological order

29
New cards

What does a block chain do?

Construct a valid block from encrypted transaction data within a certain time period

30
New cards

What is a ledger?

A record of transactions in chronological order

31
New cards

What if the ledger is tampered?

If it's not accurate, value decreases

32
New cards

What must be done for a valid transaction to take place in a bank?

It needs an entry/record in the bank's ledger

33
New cards

T/F: Every institution has their own ledger

True

34
New cards

Block Chain

Public ledger where blocks sit one after another chronologically

35
New cards

Every block contains what?

Encrypted data of all transactions from the past 10 minutes

36
New cards

All data in a block is public to the world, but it's encrypted. In order to read it, what do you need?

A private key

37
New cards

When looking at the block chain, everyone can see the _________, but not the ____________

transaction; sender or receiver

38
New cards

Why are there two output amounts on a block chain transaction log?

The total subtracts a network fee which is used to pay miners for verifying and confirming the transaction

39
New cards

Can you change a block on the block chain?

No

40
New cards

Blocks exist in the chain one after another in chronological order, which means.....

every block knows which blocks existed before it

41
New cards

Block chain is a distributed & decentralized system, which means...

The same data exists in thousands of computers around the world

42
New cards

How do you think block chain might change the future of banking?

  1. No middleman (bank)

  2. Low network fee

  3. Decentralized & transparent

  4. Very fast

43
New cards

Transactions that take place in the block chain network are done through what type of currency?

cryptocurrency

44
New cards

4 Examples of Cryptocurrencies

Bitcoin, Litecoin, Ethereum, Monero

45
New cards

Do exchange values of cryptocurrencies fluctuate like fiat currencies?

Yes, based on how many people use it

46
New cards

What is the first implementation of block chain technology?

Bitcoin

47
New cards

Altcoins

alternative cryptocurrencies launched after bitcoin's success

48
New cards

5 Altcoin examples

Ethereum, ripple, zcash, monero, dash

49
New cards

All existing fiat currencies are controlled by who?

The government- federal bank

50
New cards

What happens when governments start publishing a ton of bank notes?

Inflation

51
New cards

What is the maximum number of bitcoin to be mined?

21 million (so no inflation)

52
New cards

How long does it take to create/mine bitcoin?

10 minutes

53
New cards

What does Bitcoin use as its cryptographic hash algorithm?

SHA-256

54
New cards

Miners

People who solve cryptographic puzzles using computational resources

55
New cards

What is the concept behind Bitcoin?

Proof of Work

56
New cards

Cryptographic puzzle difficulty level

5 leading 0s (00000) indicate how hard it is to solve the puzzle

57
New cards

How do miners solve the puzzle?

By finding a cryptographic hash that matches the puzzle pattern through combining encrypted transaction data, hash of previous block, and random nonce

58
New cards

Proof of Work

Finding the block hash using computational resources

59
New cards

Merkle Root

32-byte hash that represents a summary of all transaction data

60
New cards

Merkle Tree

"Binary hash tree" - Each parent node contains the hash of its child nodes, and each leaf node contains the cryptographic hash of its single data node.

61
New cards

Advantages of a Merkle Tree

  • Tamper proof

  • Uses fewer resources

  • Verifies a transaction

62
New cards

If Alice owes Bob 1BTC for a service, what does she use to make the transfer?

A bitcoin wallet

63
New cards

What triggers Alice's transaction into entering the peer-to-peer block chain network?

When Alice triggers transaction of 1 BTC to Bob's public key

64
New cards

What two keys does Alice need to set up a transfer to Bob on the bitcoin network?

Her own private key & Bob's public key

65
New cards

What kind of network is the Bitcoin Network?

Peer-to-peer

66
New cards

The Bitcoin Network steps

  1. New transactions broadcast to all nodes

  2. Each node collects new transactions into a block

  3. Each node does proof-of-work for its block

  4. When proof-of-work is found, node broadcasts the block to all nodes

  5. Nodes accept block if all transactions are valid

  6. Nodes accept block by working on creating the next block using the accepted block hash as the previous hash

67
New cards

What is used to encrypt/decrypt data?

A key

68
New cards

What is an encryption key?

A large random # known only to the sender/recipient

69
New cards

What happens if anyone other than the sender/recipient knows the value of a secret key?

They can decrypt an encrypted document and breach confidentiality

70
New cards

Encryption is a _____________ function

two-way

71
New cards

Disadvantage of encrytion

It relies on the secret of key

72
New cards

What are the two types of encryption?

symmetric and asymmetric

73
New cards

In symmetric encryption, there is ___________ key

one shared/secret

74
New cards

In asymmetric encryption, there is ________________ key

a pair of keys: private & public

75
New cards

T/F: Private & public keys are mathematically linked together

True

76
New cards

Can you derive the private key from the public key?

NO, it's mathematically impossible

77
New cards

Which key is used to encrypt in asymmetric encryption?

Recipient's public key

78
New cards

Which key is used to sign something in asymmetric digital signature?

Sender's private key

79
New cards

Encryption is used for...

Confidentiality

80
New cards

Digital Signatures are used for...

Authentication & Nonrepudiation

81
New cards

HTTPS port

443

82
New cards

2 steps of the HTTPS protocol

  1. Handshake

  2. Data transmission

83
New cards

Once a client & server agree to use TLS, how do they negotiate a connection?

By using a handshake to agree on parameters required for a secure connection

84
New cards

Once the handshake concludes, what begins?

Secure data transmission

85
New cards

How are SSL & TLS different?

SSL is the predecessor to TLS

86
New cards

How does SSL/TLS verify the identity of communicating parties?

asymmetric (public-key) cryptography, typically required on the server

87
New cards

After successful authentication with SSL/TLS, what type of cryptography is used to encrypt the data?

symmetric key cryptography

88
New cards

Is symmetric or asymmetric key cryptography faster?

symmetric

89
New cards

SSL/TLS handshaking happens with what kind of cryptography?

with asymmetric cryptography

90
New cards

SSL/TLS secure data transmission happens with what kind of cryptography?

with symmetric cryptography

91
New cards

What kind of cryptography does SSL/TLS use?

Both asymmetric & symmetric

92
New cards

Client hello message

When a client connects to a TLS-enabled server to request a secure connection, presenting a list of supported cipher suites

93
New cards

Cipher suite

A combination of encryption and key exchange algorithms used to negotiate security settings

94
New cards

T/F: Different versions of different client browsers support different cipher suites

True

95
New cards

A server's Digital certificate contains what 3 things?

  1. Server name

  2. Trusted CA

  3. Server's public key

96
New cards

Top three Certificate Authorities (CAs)

Comodo, Symantec, GoDaddy

97
New cards

Server hello message

Server picks the strongest cipher suite it supports and notifies the client

98
New cards

Digital certificates are specified by which standard?

X.509

99
New cards

Handshake steps

  1. Client sends hello message to server

  2. Server sends hello message to client

  3. Server sends digital certificate as its identification to client

  4. Client confirms server certificate is valid

  5. Client sends Pre-Master secret key to server

  6. Client & server both generate a symmetric encryption key from the shared PMS

100
New cards

What is the Pre-Master Secret key eventually going to be used for?

Generating a symmetric encryption key