Cryptography and Encryption (CEH) Flashcards
Certified Ethical Hacker (CEH) Flashcards

| Front | Back |
| How does a certificate authority (CA) work | It issues digital certificates to validate the identity of entities in a secure communication |
| What does "encryption" mean | The process of converting plaintext into ciphertext to protect information from unauthorized access |
| What does PKI stand for | Public Key Infrastructure |
| What is a brute force attack in cryptography | An attack method that systematically tries all possible combinations to decrypt data |
| What is a cryptographic nonce | A random value used only once to ensure uniqueness in cryptographic communications |
| What is a man-in-the-middle (MITM) attack | A cyberattack where an attacker intercepts and potentially alters communication between two parties |
| What is an example of a block cipher algorithm | AES (Advanced Encryption Standard) |
| What is an example of a stream cipher algorithm | RC4 |
| What is file integrity monitoring (FIM) | A process to check for unauthorized changes to files using hashing techniques |
| What is hashing in cryptography | The process of converting data into a fixed-length unique string using a hash function |
| What is MD5 and why is it considered insecure | MD5 is a hashing algorithm that is insecure due to vulnerabilities to collision attacks |
| What is RSA encryption | An asymmetric encryption method that uses two keys, public and private, for secure communication |
| What is salting in hashing | Adding a unique random value to data before hashing to make the hash output unique even for identical inputs |
| What is steganography in the context of cryptography | The practice of hiding information within another file or medium to conceal its presence |
| What is the difference between encoding | encryption, and hashing,Encoding is for data representation, encryption secures data with reversible transformations, and hashing ensures data integrity with irreversible transformations |
| What is the difference between symmetric and asymmetric encryption | Symmetric uses one key for encryption and decryption while asymmetric uses a public and private key pair |
| What is the key length of AES-256 | 256 bits |
| What is the main purpose of a digital signature | To ensure the authenticity and integrity of a message or document |
| What is the main weakness of a weak encryption key | A weak key increases the risk of decryption by brute force or cryptanalysis |
| What is the primary purpose of AES (Advanced Encryption Standard) | To provide secure symmetric encryption for protecting data |
| What is the purpose of a hash function | To create a fixed-length output from input data for integrity verification |
| What is the purpose of cryptography | To secure communication and data by ensuring confidentiality, integrity, authentication, and non-repudiation |
| What is the role of public key infrastructure (PKI) | To manage digital certificates and public-private key pairs for secure communications |
| What is the SHA-2 algorithm | A family of cryptographic hash functions designed to provide stronger security than SHA-1 |
| What is the significance of the Diffie-Hellman algorithm | It enables two parties to securely exchange cryptographic keys over an insecure channel |
About the Flashcards
Flashcards for the Certified Ethical Hacker (CEH) exam provide a focused review of core cryptography concepts and terminology. Cards cover the purpose of cryptography, differences between encoding, encryption, and hashing, symmetric versus asymmetric systems, common algorithms like AES and RSA, and key practices such as salting, digital signatures, and the role of PKI and certificate authorities.
They also reinforce operational ideas often tested on exams: key exchange with Diffie-Hellman, block and stream cipher examples, hash functions (SHA-2 and MD5), file integrity monitoring, nonces and steganography, plus common attacks like brute-force and man-in-the-middle and the importance of key length.
Topics covered in this flashcard deck:
- Symmetric vs asymmetric encryption
- Hashing and salting
- Public Key Infrastructure (PKI)
- Digital signatures and nonces
- Block and stream ciphers
- Cryptographic attacks and weaknesses