ISC2 CISSP - Cryptography Fundamentals Flashcards
ISC2 CISSP Flashcards

| Front | Back |
| Asymmetric encryption uses a pair of keys: a public key and a private key. | True |
| In the encryption lifecycle | what phase involves key generation?,Key Management |
| Symmetric encryption uses the same key for both encryption and decryption. | True |
| What algorithm is commonly used for secure key exchange in asymmetric cryptography? | Diffie-Hellman |
| What does AES stand for? | Advanced Encryption Standard |
| What is a man-in-the-middle attack? | An attack where the adversary secretly intercepts and possibly alters the communication between two parties |
| What is a nonce? | A number used once to ensure freshness in cryptographic communication |
| What is digital signature used for? | To ensure non-repudiation and data integrity |
| What is entropy in the context of cryptography? | A measure of randomness or unpredictability in a key or system |
| What is public key infrastructure (PKI)? | A framework of policies and services to create, manage, distribute, and revoke digital certificates |
| What is steganography? | The practice of hiding messages within other non-secret text or data |
| What is the main difference between block ciphers and stream ciphers? | Block ciphers encrypt fixed-size blocks of data, while stream ciphers encrypt data one bit or byte at a time |
| What is the primary goal of cryptography? | To protect the confidentiality, integrity, and authenticity of information |
| What is the purpose of a cryptographic hash function? | To produce a fixed-size unique representation of data |
| What is the purpose of an Initialization Vector (IV)? | To ensure that the same plaintext encrypts to different ciphertexts each time |
| What is the role of a Certificate Authority (CA)? | To issue digital certificates that authenticate the identity of entities |
| What protocol is widely used to secure web traffic? | TLS (Transport Layer Security) |
| What protocol provides secure email communication? | S/MIME (Secure/Multipurpose Internet Mail Extensions) |
| Which cipher mode combines the IV with the first plaintext block. | CBC (Cipher Block Chaining) |
About the Flashcards
Flashcards for the ISC2 CISSP exam provide focused review of core cryptography concepts and terminology. The deck covers the goals of cryptography (confidentiality, integrity, authenticity), symmetric and asymmetric systems, key algorithms such as AES and Diffie-Hellman, and the distinction between block and stream ciphers.
It reinforces cryptographic primitives and operational details-hash functions, nonces, IVs, entropy, and cipher modes like CBC-and covers applied topics including digital signatures, key management, PKI and Certificate Authorities, secure protocols such as TLS and S/MIME, steganography, and common attacks like man-in-the-middle. Ideal for reviewing terminology, concepts, and key ideas tested on the exam.
Topics covered in this flashcard deck:
- Symmetric and asymmetric encryption
- Cryptographic hash functions
- Key management and PKI
- Cipher modes and IVs
- Protocols: TLS and S/MIME
- Digital signatures and non-repudiation