Bash, the Crucial Exams Chat Bot
AI Bot

Cryptography and Encryption (CEH) Flashcards

Certified Ethical Hacker (CEH) Flashcards

Study our Cryptography and Encryption (CEH) flashcards for the Certified Ethical Hacker (CEH) exam with 25+ flashcards. View as flashcards, a searchable table, or as a fun matching game.
Certified Ethical Hacker (CEH) Course Header Image
FrontBack
How does a certificate authority (CA) workIt issues digital certificates to validate the identity of entities in a secure communication
What does "encryption" meanThe process of converting plaintext into ciphertext to protect information from unauthorized access
What does PKI stand forPublic Key Infrastructure
What is a brute force attack in cryptographyAn attack method that systematically tries all possible combinations to decrypt data
What is a cryptographic nonceA random value used only once to ensure uniqueness in cryptographic communications
What is a man-in-the-middle (MITM) attackA cyberattack where an attacker intercepts and potentially alters communication between two parties
What is an example of a block cipher algorithmAES (Advanced Encryption Standard)
What is an example of a stream cipher algorithmRC4
What is file integrity monitoring (FIM)A process to check for unauthorized changes to files using hashing techniques
What is hashing in cryptographyThe process of converting data into a fixed-length unique string using a hash function
What is MD5 and why is it considered insecureMD5 is a hashing algorithm that is insecure due to vulnerabilities to collision attacks
What is RSA encryptionAn asymmetric encryption method that uses two keys, public and private, for secure communication
What is salting in hashingAdding a unique random value to data before hashing to make the hash output unique even for identical inputs
What is steganography in the context of cryptographyThe practice of hiding information within another file or medium to conceal its presence
What is the difference between encodingencryption, and hashing,Encoding is for data representation, encryption secures data with reversible transformations, and hashing ensures data integrity with irreversible transformations
What is the difference between symmetric and asymmetric encryptionSymmetric uses one key for encryption and decryption while asymmetric uses a public and private key pair
What is the key length of AES-256256 bits
What is the main purpose of a digital signatureTo ensure the authenticity and integrity of a message or document
What is the main weakness of a weak encryption keyA weak key increases the risk of decryption by brute force or cryptanalysis
What is the primary purpose of AES (Advanced Encryption Standard)To provide secure symmetric encryption for protecting data
What is the purpose of a hash functionTo create a fixed-length output from input data for integrity verification
What is the purpose of cryptographyTo secure communication and data by ensuring confidentiality, integrity, authentication, and non-repudiation
What is the role of public key infrastructure (PKI)To manage digital certificates and public-private key pairs for secure communications
What is the SHA-2 algorithmA family of cryptographic hash functions designed to provide stronger security than SHA-1
What is the significance of the Diffie-Hellman algorithmIt enables two parties to securely exchange cryptographic keys over an insecure channel

About the Flashcards

Flashcards for the Certified Ethical Hacker (CEH) exam provide a focused review of core cryptography concepts and terminology. Cards cover the purpose of cryptography, differences between encoding, encryption, and hashing, symmetric versus asymmetric systems, common algorithms like AES and RSA, and key practices such as salting, digital signatures, and the role of PKI and certificate authorities.

They also reinforce operational ideas often tested on exams: key exchange with Diffie-Hellman, block and stream cipher examples, hash functions (SHA-2 and MD5), file integrity monitoring, nonces and steganography, plus common attacks like brute-force and man-in-the-middle and the importance of key length.

Topics covered in this flashcard deck:

  • Symmetric vs asymmetric encryption
  • Hashing and salting
  • Public Key Infrastructure (PKI)
  • Digital signatures and nonces
  • Block and stream ciphers
  • Cryptographic attacks and weaknesses
Share on...
Follow us on...