Bash, the Crucial Exams Chat Bot
AI Bot
Cryptography and Encryption (CEH) Flashcards
Certified Ethical Hacker (CEH) Flashcards
| Front | Back |
| How does a certificate authority (CA) work | It issues digital certificates to validate the identity of entities in a secure communication |
| What does "encryption" mean | The process of converting plaintext into ciphertext to protect information from unauthorized access |
| What does PKI stand for | Public Key Infrastructure |
| What is a brute force attack in cryptography | An attack method that systematically tries all possible combinations to decrypt data |
| What is a cryptographic nonce | A random value used only once to ensure uniqueness in cryptographic communications |
| What is a man-in-the-middle (MITM) attack | A cyberattack where an attacker intercepts and potentially alters communication between two parties |
| What is an example of a block cipher algorithm | AES (Advanced Encryption Standard) |
| What is an example of a stream cipher algorithm | RC4 |
| What is file integrity monitoring (FIM) | A process to check for unauthorized changes to files using hashing techniques |
| What is hashing in cryptography | The process of converting data into a fixed-length unique string using a hash function |
| What is MD5 and why is it considered insecure | MD5 is a hashing algorithm that is insecure due to vulnerabilities to collision attacks |
| What is RSA encryption | An asymmetric encryption method that uses two keys, public and private, for secure communication |
| What is salting in hashing | Adding a unique random value to data before hashing to make the hash output unique even for identical inputs |
| What is steganography in the context of cryptography | The practice of hiding information within another file or medium to conceal its presence |
| What is the difference between encoding | encryption, and hashing,Encoding is for data representation, encryption secures data with reversible transformations, and hashing ensures data integrity with irreversible transformations |
| What is the difference between symmetric and asymmetric encryption | Symmetric uses one key for encryption and decryption while asymmetric uses a public and private key pair |
| What is the key length of AES-256 | 256 bits |
| What is the main purpose of a digital signature | To ensure the authenticity and integrity of a message or document |
| What is the main weakness of a weak encryption key | A weak key increases the risk of decryption by brute force or cryptanalysis |
| What is the primary purpose of AES (Advanced Encryption Standard) | To provide secure symmetric encryption for protecting data |
| What is the purpose of a hash function | To create a fixed-length output from input data for integrity verification |
| What is the purpose of cryptography | To secure communication and data by ensuring confidentiality, integrity, authentication, and non-repudiation |
| What is the role of public key infrastructure (PKI) | To manage digital certificates and public-private key pairs for secure communications |
| What is the SHA-2 algorithm | A family of cryptographic hash functions designed to provide stronger security than SHA-1 |
| What is the significance of the Diffie-Hellman algorithm | It enables two parties to securely exchange cryptographic keys over an insecure channel |
This deck explains cryptographic concepts, hashing, encryption methods, and their applications in securing data, as well as their relevance in ethical hacking.