Shared Flashcard Set

Details

Chapter 4: Stuff he said we should know
Chapter 4. Questions + Stuff he said we need to know
34
Computer Science
12th Grade
02/11/2013

Additional Computer Science Flashcards

 


 

Cards

Term

What is the biggest drawback to symmetric encryption? 

 

A. It is too easily broken.

 

B. It is too slow to be easily used on mobile devices. 

 

C. It requires a key to be securely shared.

 

D. It is available only on UNIX.

Definition

C. 

 

In symmetric encryption, the key must be securely shared. This can be complicated because long keys are required for good security.

Term

What is Diffie-Hellman most commonly used for?

 

A. Symmetric encryption key exchange 

 

B. Signing digital contracts

 

C. Secure e-mail

 

D. Storing encrypted passwords

Definition

A. 

 

Diffie-Hellman is most commonly used to protect the exchange of keys used to create a connection using symmetric encryption. It is often used in Transport Layer Security (TLS) implementations for protecting secure web pages.

Term

What is AES meant to replace?

 

A. IDEA

 

B. DES

 

C. Diffie-Hellman

 

D. MD5

Definition

B. 

 

AES, or Advanced Encryption Standard, is designed to replace the old U.S. government standard DES.

Term

What kind of encryption cannot be reversed? 

 

A. Asymmetric

 

B. Hash

 

C. Linear cryptanalysis

 

D. Authentication

Definition

B. 

 

Hash functions are one-way and cannot be reversed to provide the original plaintext.

Term

What is public key cryptography a more common name for?

 

A. Asymmetric encryption

 

B. SHA

 

C. An algorithm that is no longer secure against cryptanalysis

 

D. Authentication

Definition

A. 

 

Asymmetric encryption is another name for public key cryptography.

Term

How many bits are in a block of the SHA algorithm?

 

A. 128 

 

B. 64 

 

C. 512

 

D. 1024

Definition

C.

 

512 bits make up a block in SHA.

Term

How does elliptical curve cryptography work?

 

A. It multiplies two large primes.

 

B. It uses the geometry of a curve to calculate three points. 

 

C. It shifts the letters of the message in an increasing curve.

 

D. It uses graphs instead of keys.

Definition

B. 

 

Elliptical curve cryptography uses two points to calculate a third point on the curve.

Term

A good hash function is resistant to what?

 

A. Brute-forcing 

 

B. Rainbow tables 

 

C. Interception

 

D. Collisions

Definition

D. 

 

A good hash algorithm is resistant to collisions, or two different inputs hashing to the same value.

Term

How is 3DES an improvement over normal DES?

 

A. It uses public and private keys.

 

B. It hashes the message before encryption.

 

C. It uses three keys and multiple encryption and/or decryption sets.

 

D. It is faster than DES.

Definition

C. 

 

3DES uses multiple keys and multiple encryption or decryption rounds to improve security over regular DES.

Term

What is the best kind of key to have?

 

A. Easy to remember

 

B. Long and random

 

C. Long and predictable

 

D. Short

Definition

B. 

 

The best encryption key is one that is long and random, to reduce the predictability of the key.

Term

What makes asymmetric encryption better than symmetric encryption? 

 

A. It is more secure.

 

B. Key management is part of the algorithm.

 

C. Anyone with a public key could decrypt the data.

 

D. It uses a hash.

Definition

B. 

 

In public key cryptography, only the private keys are secret, so key management is built into the algorithm.

Term

What kinds of encryption does a digital signature use?

 

A. Hashing and asymmetric 

 

B. Asymmetric and symmetric 

 

C. Hashing and symmetric

 

D. All of the above

Definition

A. 

 

Digital signatures use hashing and asymmetric encryption.

Term

What does differential cryptanalysis require?

 

A. The key

 

B. Large amounts of plaintext and ciphertext

 

C. Just large amounts of ciphertext

 

D. Computers able to guess at key values faster than a billion times per second

Definition

B. 

 

Differential cryptanalysis requires large amounts of plaintext and ciphertext.

Term

What is a brute-force attack?

 

A. Feeding certain plaintext into the algorithm to deduce the key

 

B. Capturing ciphertext with known plaintext values to deduce the key 

 

C. Sending every key value at the algorithm to find the key

 

D. Sending two large men to the key owner’s house to retrieve the key

Definition

C. 

 

Brute-forcing is the attempt to use every possible key to find the correct one.

Term

What is key escrow?

 

A. Printing out your private key

 

B. How Diffie-Hellman exchanges keys

 

C. When the government keeps a copy of your key

 

D. Rijndael

Definition

C. 

 

When the government keeps a copy of your private key, this is typically referred to as key escrow.

Term

What is "Asymmetric Encryption"?

 

Definition

"Also called public key cryptography, this is a system for encrypting data that uses two mathematically derived keys to encrypt and decrypt a message-- a public key, available to everyone, and a private key, available only to the owner of the key." ~Book

 

 

 

 

Term
What is "Symmetric Encription"?
Definition
"Encryption that needs all parties to have a copy of the key, sometimes called a shared secret. The single key is used for both encryption and decryption. Key management is not built into the algorithm." ~Book
Term
What is a "Hash"?
Definition
"A type of encryption that takes an input and mathematically reduces it to a unique number."
Term
What is a "key"?
Definition
A" key is a special piece of data used in both the encryption and decryption processes." ~Book
Term
What is a "One-Time pad"?
Definition
"A one-time pad is a cypher, with a good random key, that is considered unbreakable." ~ Exam tip
Term
List the types of Symetrical Key Encryption...
Definition

- DES

- 3DES

- AES

- IDEA

- Blowfish

- CAST

- RC2

- RC4

- RC5

- RC6

Term
Explain DES...
Definition

DES (Data Encryption Standard) was developed in response to the National Bureau of Standards (NBS).

 

Des is a block cipher, in that it segments the input data into blocks of a specified size, typically padding the last block to make it a multiple of the block size required. 

 

- DES block-sizes are 64bits, which means it takes a 64-bit input and outputs 64 bits of ciphertext.


- DES uses a key length of 56 bits, and all security rest within the key.

 

- "At the most basic level, DES performs a substitution and then a permutation on the input, based on the key. This aciton is called a round, and DES performs this 16 times on every 64-bit block. 

 

- After all 16 rounds have been completed and the inverse permutation as been completed, the ciphertext is output as 64 bits. The algorithm picks up the next 64 bits and starts all over again. This is carried out until the entire message has been encrypted with DES.

 

- The same algorith and key are used to decrypt the message, except in reverse order. 

 

Term
Explain 3DES...
Definition

Tripple DES (3DES) is a varriant of DES where, depending on the vaiant, it uses either 2 or 3 keys instead of the single key that DES uses. 

 

It also spins through the DES algorithm three times in what's called multiple encryption. 

Term
Explain AES...
Definition

Advanced Encryption Standard (AES) is a block cipher that uses symmetric key cryptography and supporting key sizes of 128, 192 and 256 bits.

 

Like DES, it works in 3 steps on every block of input data (too complicated to explain)...

 

After the steps have been performed, a 128-bit block of plaintext produces a 128-bit block of ciphertext. However many rounds AES performs on the blocks the size of the key  (128-bit keys require 9 rounds, 192-bit keys require 11 rounds, and 256-bit keys use 13 rounds). 

 

Four steps are performed in every round (too complicated to explain). When the final round has been completed, the ciphertext is output.

Term
List the most common types of Asymmetric encryption...
Definition

- RSA

- Diffie - Hellman

- ElGamal

- ECC

Term
Explain RSA...
Definition

- The first public key cryptosystems ever invented.

 

- Can be used for both encryption and digital signatures. 

 

- The algorithm uses the product of two very large prime numbers to generate an encryption and decryption key.

 

- To encrypt a message, it will be divided into blocks less than the product of the two prime numbers... Then it gets complicated :-\

Term
Explain Diffie - Hellman...
Definition

Diffie-Hellman is an encryption protocol that allows for electronic key exchange of the Secure Sockets Layer (SSL) protocol.

 

- Used by SSH and IPsec protocols.

 

- It is important because it enables the sharing of a secret key between two people who have not contacted each other before.

 

- Explaining how it works is too complicated!

Term
Explain ElGamal...
Definition

- Can be used for both encryption and digital signatures.

 

- System was never patended and is free for use.

 

- It is  used as the US Government standard for digital signatures.

 

- How it works is too complicated!

Term
Explain ECC...
Definition

Elliptical Curve Cryptography (ECC) works on the basis of elliptical curves

 

Elliptical curves work because they have a special property-- you can add two points on the curve together and get a third point on the curve.

 

For cryptography, the EC works as a public key algorithm. Users agree on an elliptical curve and a fixed point. This information is not a shared secret.

Term
List the common hashing algorithms...
Definition

- MD2

- MD4

- MD5

- SHA-1

 

(We only need to know MD5 and SHA-1 for the exam)

Term
Explain SHA-1...
Definition

It is the algorithm of choice for the US Digital Signatures Standard (DSS).

 

It is modeled on MD4 algorith and impliments fixes to the algorithm discovered by the NSA.

 

Creates message digests 160 bits long.

 

"SH1 works by applying a compression function to the data input." ~Book. Too long to explain!

Term
Explain MD5...
Definition

- Similar to MD4, only slightly slower and more secure.

 

- MD5 creates a 128-bit hash of a message of any length. Like MD4 and SHA-1 it segments th message into 512-bit blocks and then into 16, 32-bit words.

 

Term
What is Footprinting?
Definition
Footprinting is "identifying the OS" ~ Class notes.
Term
What is Digest2004?
Definition
"A tool used to check the hash value you just downloaded matches the hash value on the website you downloaded from." ~Class notes.
Supporting users have an ad free experience!