🔥 40% Off Crucial Exams Memberships — Deal ends today!

3 hours, 33 minutes remaining!
Bash, the Crucial Exams Chat Bot
AI Bot

Cryptography and Encryption (CEH)  Flashcards

Certified Ethical Hacker (CEH) Flashcards

It issues digital certificates to validate the identity of entities in a secure communication
What is MD5 and why is it considered insecure
A weak key increases the risk of decryption by brute force or cryptanalysis
What does PKI stand for
MD5 is a hashing algorithm that is insecure due to vulnerabilities to collision attacks
Public Key Infrastructure
256 bits
What is the main weakness of a weak encryption key
What is the key length of AES-256
What is the purpose of cryptography
How does a certificate authority (CA) work
To secure communication and data by ensuring confidentiality, integrity, authentication, and non-repudiation
FrontBack
How does a certificate authority (CA) workIt issues digital certificates to validate the identity of entities in a secure communication
What does "encryption" meanThe process of converting plaintext into ciphertext to protect information from unauthorized access
What does PKI stand forPublic Key Infrastructure
What is a brute force attack in cryptographyAn attack method that systematically tries all possible combinations to decrypt data
What is a cryptographic nonceA random value used only once to ensure uniqueness in cryptographic communications
What is a man-in-the-middle (MITM) attackA cyberattack where an attacker intercepts and potentially alters communication between two parties
What is an example of a block cipher algorithmAES (Advanced Encryption Standard)
What is an example of a stream cipher algorithmRC4
What is file integrity monitoring (FIM)A process to check for unauthorized changes to files using hashing techniques
What is hashing in cryptographyThe process of converting data into a fixed-length unique string using a hash function
What is MD5 and why is it considered insecureMD5 is a hashing algorithm that is insecure due to vulnerabilities to collision attacks
What is RSA encryptionAn asymmetric encryption method that uses two keys, public and private, for secure communication
What is salting in hashingAdding a unique random value to data before hashing to make the hash output unique even for identical inputs
What is steganography in the context of cryptographyThe practice of hiding information within another file or medium to conceal its presence
What is the difference between encodingencryption, and hashing,Encoding is for data representation, encryption secures data with reversible transformations, and hashing ensures data integrity with irreversible transformations
What is the difference between symmetric and asymmetric encryptionSymmetric uses one key for encryption and decryption while asymmetric uses a public and private key pair
What is the key length of AES-256256 bits
What is the main purpose of a digital signatureTo ensure the authenticity and integrity of a message or document
What is the main weakness of a weak encryption keyA weak key increases the risk of decryption by brute force or cryptanalysis
What is the primary purpose of AES (Advanced Encryption Standard)To provide secure symmetric encryption for protecting data
What is the purpose of a hash functionTo create a fixed-length output from input data for integrity verification
What is the purpose of cryptographyTo secure communication and data by ensuring confidentiality, integrity, authentication, and non-repudiation
What is the role of public key infrastructure (PKI)To manage digital certificates and public-private key pairs for secure communications
What is the SHA-2 algorithmA family of cryptographic hash functions designed to provide stronger security than SHA-1
What is the significance of the Diffie-Hellman algorithmIt enables two parties to securely exchange cryptographic keys over an insecure channel
Front
What is a brute force attack in cryptography
Click the card to flip
Back
An attack method that systematically tries all possible combinations to decrypt data
Front
What is a man-in-the-middle (MITM) attack
Back
A cyberattack where an attacker intercepts and potentially alters communication between two parties
Front
What is salting in hashing
Back
Adding a unique random value to data before hashing to make the hash output unique even for identical inputs
Front
What is the main weakness of a weak encryption key
Back
A weak key increases the risk of decryption by brute force or cryptanalysis
Front
What is the purpose of a hash function
Back
To create a fixed-length output from input data for integrity verification
Front
What is an example of a block cipher algorithm
Back
AES (Advanced Encryption Standard)
Front
What is the difference between encoding
Back
encryption, and hashing,Encoding is for data representation, encryption secures data with reversible transformations, and hashing ensures data integrity with irreversible transformations
Front
What is an example of a stream cipher algorithm
Back
RC4
Front
What is the role of public key infrastructure (PKI)
Back
To manage digital certificates and public-private key pairs for secure communications
Front
What is the key length of AES-256
Back
256 bits
Front
How does a certificate authority (CA) work
Back
It issues digital certificates to validate the identity of entities in a secure communication
Front
What is steganography in the context of cryptography
Back
The practice of hiding information within another file or medium to conceal its presence
Front
What is the SHA-2 algorithm
Back
A family of cryptographic hash functions designed to provide stronger security than SHA-1
Front
What is the purpose of cryptography
Back
To secure communication and data by ensuring confidentiality, integrity, authentication, and non-repudiation
Front
What does PKI stand for
Back
Public Key Infrastructure
Front
What is a cryptographic nonce
Back
A random value used only once to ensure uniqueness in cryptographic communications
Front
What is the main purpose of a digital signature
Back
To ensure the authenticity and integrity of a message or document
Front
What is RSA encryption
Back
An asymmetric encryption method that uses two keys, public and private, for secure communication
Front
What is the primary purpose of AES (Advanced Encryption Standard)
Back
To provide secure symmetric encryption for protecting data
Front
What is file integrity monitoring (FIM)
Back
A process to check for unauthorized changes to files using hashing techniques
Front
What is hashing in cryptography
Back
The process of converting data into a fixed-length unique string using a hash function
Front
What is the difference between symmetric and asymmetric encryption
Back
Symmetric uses one key for encryption and decryption while asymmetric uses a public and private key pair
Front
What is the significance of the Diffie-Hellman algorithm
Back
It enables two parties to securely exchange cryptographic keys over an insecure channel
Front
What does "encryption" mean
Back
The process of converting plaintext into ciphertext to protect information from unauthorized access
Front
What is MD5 and why is it considered insecure
Back
MD5 is a hashing algorithm that is insecure due to vulnerabilities to collision attacks
1/25
This deck explains cryptographic concepts, hashing, encryption methods, and their applications in securing data, as well as their relevance in ethical hacking.
Share on...
Follow us on...