Crypto Midterm

studied byStudied by 1 person
0.0(0)
learn
LearnA personalized and smart learning plan
exam
Practice TestTake a test on your terms and definitions
spaced repetition
Spaced RepetitionScientifically backed study method
heart puzzle
Matching GameHow quick can you match all your cards?
flashcards
FlashcardsStudy terms and definitions

1 / 218

encourage image

There's no tags or description

Looks like no one added any tags here yet for you.

219 Terms

1

Encryption

Converting plaintext into unreadable characters with a key

New cards
2

Decryption

Converting unreadable characters into plaintext with a key

New cards
3

Encryption is _____________

a 2-way function

New cards
4

Hashing

Converting plaintext of any length into a short code

New cards
5

Hashing is _____________

a 1-way function

New cards
6

Can you recover plaintext from a hash?

No

New cards
7

3 Fundamental issues of a currency system?

  1. How to buy original art?

  2. How to sell art from collection?

  3. How to detect stolen art?

New cards
8

In the U.S., our current currency system is......

Fiat

New cards
9

Barter System example

Offering chickens for a yearly newspaper subscription

New cards
10

What is a problem with the Barter System example?

If the newspaper editor doesn't need chicken, but bread instead

New cards
11

What is a solution to the Barter System problem?

Find something that is valuable to everyone (gold)

New cards
12

Why choose gold as a solution to the Barter System?

It's rare, but not too rare

New cards
13

Gold Standard

A monetary system where a country's currency or paper money has value directly linked to gold

New cards
14

What does the fixed price for gold determine?

The value of the currency

New cards
15

If the U.S. sets the price of gold at $500/ounce, the value of the dollar would be...

1/500th of an ounce of gold

New cards
16

Do we currently follow the gold standard?

No, we follow the Fiat system

New cards
17

Fiat System

Monetary system where the value of currency isn't based on a physical commodity, but fluctuates dynamically against other currencies on the foreign-exchange market

New cards
18

Fiat is derived from what word?

Latin fieri- which means an arbitrary act or decree

New cards
19

The value of fiat currencies is based on what?

The fact that they're legal tender by government decree

New cards
20

Is the gold standard currently used by any government?

No

New cards
21

What is officially crowned as the world's reserve currency?

U.S. dollar, backed by the world's largest gold reserves

New cards
22

What WWII agreement crowned the U.S. dollar as the world's reserve currency?

Bretton Woods Agreement

New cards
23

In the U.S., which president ended the Bretton Woods system & began the era of free floating fiat currencies?

Nixon

New cards
24

In a banking system, what role does the bank act as?

A middleman trusted by both parties

New cards
25

What if there is an alternate middleman, instead of a bank, that is fast, automated, transparent, and free from hacking/tampering?

Block chain

New cards
26

Bitcoin

1st cryptocurrency developed based on blockchain technology

New cards
27

Who invented Bitcoin?

Unknown group/person by the name Satoshi Nakamoto

New cards
28

What is a block chain?

A unchangeable, distributed, decentralized ledger in chronological order

New cards
29

What does a block chain do?

Construct a valid block from encrypted transaction data within a certain time period

New cards
30

What is a ledger?

A record of transactions in chronological order

New cards
31

What if the ledger is tampered?

If it's not accurate, value decreases

New cards
32

What must be done for a valid transaction to take place in a bank?

It needs an entry/record in the bank's ledger

New cards
33

T/F: Every institution has their own ledger

True

New cards
34

Block Chain

Public ledger where blocks sit one after another chronologically

New cards
35

Every block contains what?

Encrypted data of all transactions from the past 10 minutes

New cards
36

All data in a block is public to the world, but it's encrypted. In order to read it, what do you need?

A private key

New cards
37

When looking at the block chain, everyone can see the _________, but not the ____________

transaction; sender or receiver

New cards
38

Why are there two output amounts on a block chain transaction log?

The total subtracts a network fee which is used to pay miners for verifying and confirming the transaction

New cards
39

Can you change a block on the block chain?

No

New cards
40

Blocks exist in the chain one after another in chronological order, which means.....

every block knows which blocks existed before it

New cards
41

Block chain is a distributed & decentralized system, which means...

The same data exists in thousands of computers around the world

New cards
42

How do you think block chain might change the future of banking?

  1. No middleman (bank)

  2. Low network fee

  3. Decentralized & transparent

  4. Very fast

New cards
43

Transactions that take place in the block chain network are done through what type of currency?

cryptocurrency

New cards
44

4 Examples of Cryptocurrencies

Bitcoin, Litecoin, Ethereum, Monero

New cards
45

Do exchange values of cryptocurrencies fluctuate like fiat currencies?

Yes, based on how many people use it

New cards
46

What is the first implementation of block chain technology?

Bitcoin

New cards
47

Altcoins

alternative cryptocurrencies launched after bitcoin's success

New cards
48

5 Altcoin examples

Ethereum, ripple, zcash, monero, dash

New cards
49

All existing fiat currencies are controlled by who?

The government- federal bank

New cards
50

What happens when governments start publishing a ton of bank notes?

Inflation

New cards
51

What is the maximum number of bitcoin to be mined?

21 million (so no inflation)

New cards
52

How long does it take to create/mine bitcoin?

10 minutes

New cards
53

What does Bitcoin use as its cryptographic hash algorithm?

SHA-256

New cards
54

Miners

People who solve cryptographic puzzles using computational resources

New cards
55

What is the concept behind Bitcoin?

Proof of Work

New cards
56

Cryptographic puzzle difficulty level

5 leading 0s (00000) indicate how hard it is to solve the puzzle

New cards
57

How do miners solve the puzzle?

By finding a cryptographic hash that matches the puzzle pattern through combining encrypted transaction data, hash of previous block, and random nonce

New cards
58

Proof of Work

Finding the block hash using computational resources

New cards
59

Merkle Root

32-byte hash that represents a summary of all transaction data

New cards
60

Merkle Tree

"Binary hash tree" - Each parent node contains the hash of its child nodes, and each leaf node contains the cryptographic hash of its single data node.

New cards
61

Advantages of a Merkle Tree

  • Tamper proof

  • Uses fewer resources

  • Verifies a transaction

New cards
62

If Alice owes Bob 1BTC for a service, what does she use to make the transfer?

A bitcoin wallet

New cards
63

What triggers Alice's transaction into entering the peer-to-peer block chain network?

When Alice triggers transaction of 1 BTC to Bob's public key

New cards
64

What two keys does Alice need to set up a transfer to Bob on the bitcoin network?

Her own private key & Bob's public key

New cards
65

What kind of network is the Bitcoin Network?

Peer-to-peer

New cards
66

The Bitcoin Network steps

  1. New transactions broadcast to all nodes

  2. Each node collects new transactions into a block

  3. Each node does proof-of-work for its block

  4. When proof-of-work is found, node broadcasts the block to all nodes

  5. Nodes accept block if all transactions are valid

  6. Nodes accept block by working on creating the next block using the accepted block hash as the previous hash

New cards
67

What is used to encrypt/decrypt data?

A key

New cards
68

What is an encryption key?

A large random # known only to the sender/recipient

New cards
69

What happens if anyone other than the sender/recipient knows the value of a secret key?

They can decrypt an encrypted document and breach confidentiality

New cards
70

Encryption is a _____________ function

two-way

New cards
71

Disadvantage of encrytion

It relies on the secret of key

New cards
72

What are the two types of encryption?

symmetric and asymmetric

New cards
73

In symmetric encryption, there is ___________ key

one shared/secret

New cards
74

In asymmetric encryption, there is ________________ key

a pair of keys: private & public

New cards
75

T/F: Private & public keys are mathematically linked together

True

New cards
76

Can you derive the private key from the public key?

NO, it's mathematically impossible

New cards
77

Which key is used to encrypt in asymmetric encryption?

Recipient's public key

New cards
78

Which key is used to sign something in asymmetric digital signature?

Sender's private key

New cards
79

Encryption is used for...

Confidentiality

New cards
80

Digital Signatures are used for...

Authentication & Nonrepudiation

New cards
81

HTTPS port

443

New cards
82

2 steps of the HTTPS protocol

  1. Handshake

  2. Data transmission

New cards
83

Once a client & server agree to use TLS, how do they negotiate a connection?

By using a handshake to agree on parameters required for a secure connection

New cards
84

Once the handshake concludes, what begins?

Secure data transmission

New cards
85

How are SSL & TLS different?

SSL is the predecessor to TLS

New cards
86

How does SSL/TLS verify the identity of communicating parties?

asymmetric (public-key) cryptography, typically required on the server

New cards
87

After successful authentication with SSL/TLS, what type of cryptography is used to encrypt the data?

symmetric key cryptography

New cards
88

Is symmetric or asymmetric key cryptography faster?

symmetric

New cards
89

SSL/TLS handshaking happens with what kind of cryptography?

with asymmetric cryptography

New cards
90

SSL/TLS secure data transmission happens with what kind of cryptography?

with symmetric cryptography

New cards
91

What kind of cryptography does SSL/TLS use?

Both asymmetric & symmetric

New cards
92

Client hello message

When a client connects to a TLS-enabled server to request a secure connection, presenting a list of supported cipher suites

New cards
93

Cipher suite

A combination of encryption and key exchange algorithms used to negotiate security settings

New cards
94

T/F: Different versions of different client browsers support different cipher suites

True

New cards
95

A server's Digital certificate contains what 3 things?

  1. Server name

  2. Trusted CA

  3. Server's public key

New cards
96

Top three Certificate Authorities (CAs)

Comodo, Symantec, GoDaddy

New cards
97

Server hello message

Server picks the strongest cipher suite it supports and notifies the client

New cards
98

Digital certificates are specified by which standard?

X.509

New cards
99

Handshake steps

  1. Client sends hello message to server

  2. Server sends hello message to client

  3. Server sends digital certificate as its identification to client

  4. Client confirms server certificate is valid

  5. Client sends Pre-Master secret key to server

  6. Client & server both generate a symmetric encryption key from the shared PMS

New cards
100

What is the Pre-Master Secret key eventually going to be used for?

Generating a symmetric encryption key

New cards

Explore top notes

note Note
studied byStudied by 10 people
697 days ago
4.5(2)
note Note
studied byStudied by 52 people
316 days ago
5.0(2)
note Note
studied byStudied by 168 people
1009 days ago
5.0(1)
note Note
studied byStudied by 52 people
509 days ago
5.0(1)
note Note
studied byStudied by 21 people
213 days ago
5.0(1)
note Note
studied byStudied by 20 people
900 days ago
5.0(1)
note Note
studied byStudied by 74 people
724 days ago
5.0(2)
note Note
studied byStudied by 57275 people
701 days ago
4.8(405)

Explore top flashcards

flashcards Flashcard (67)
studied byStudied by 22 people
824 days ago
5.0(2)
flashcards Flashcard (27)
studied byStudied by 17 people
519 days ago
4.0(1)
flashcards Flashcard (49)
studied byStudied by 8 people
837 days ago
5.0(1)
flashcards Flashcard (20)
studied byStudied by 1 person
301 days ago
5.0(1)
flashcards Flashcard (30)
studied byStudied by 18 people
679 days ago
5.0(1)
flashcards Flashcard (37)
studied byStudied by 2 people
295 days ago
4.0(1)
flashcards Flashcard (55)
studied byStudied by 1 person
779 days ago
5.0(1)
flashcards Flashcard (47)
studied byStudied by 9 people
151 days ago
5.0(1)
robot