Bash, the Crucial Exams Chat Bot
AI Bot

Cryptography Basics  Flashcards

ISC2 Certified in Cybersecurity (CC) Flashcards

The process of securely sharing encryption keys between parties
What is a Cipher
What is a certificate authority (CA)
What is a hash function
An algorithm for performing encryption or decryption
What is a brute force attack
What is key exchange
An entity that issues digital certificates to authenticate the identity of organizations and individuals
Method of cracking encryption by systematically testing all possible keys
A function that converts input data into a fixed-size unique string called a hash
SHA-256 produces a stronger and longer hash compared to the older and compromised MD5 algorithm
What is the difference between MD5 and SHA-256
FrontBack
What does SSL/TLS use for encryptionA combination of symmetric and asymmetric encryption techniques
What is a brute force attackMethod of cracking encryption by systematically testing all possible keys
What is a certificate authority (CA)An entity that issues digital certificates to authenticate the identity of organizations and individuals
What is a CipherAn algorithm for performing encryption or decryption
What is a digital signatureA cryptographic method for verifying the authenticity and integrity of a digital message or document
What is a hash functionA function that converts input data into a fixed-size unique string called a hash
What is an example of a symmetric encryption algorithmAES
What is an example of an asymmetric encryption algorithmRSA
What is asymmetric encryptionEncryption method where a pair of keys (public and private) is used
What is key exchangeThe process of securely sharing encryption keys between parties
What is key length's importance in cryptographyLonger keys provide stronger security against brute force attacks
What is symmetric encryptionEncryption method where the same key is used for both encryption and decryption
What is the difference between a stream cipher and a block cipherStream ciphers encrypt data sequentially while block ciphers encrypt data in fixed-size blocks
What is the difference between encryption and hashingEncryption is reversible with a key while hashing is one-way and irreversible
What is the difference between MD5 and SHA-256SHA-256 produces a stronger and longer hash compared to the older and compromised MD5 algorithm
What is the main weakness of symmetric encryptionKey distribution since both parties need access to the same secret key
What is the primary purpose of cryptographyEnsuring confidentiality, integrity, authentication, and non-repudiation of data
What is the purpose of a private key in asymmetric cryptographyUsed for decryption or creating digital signatures
What is the purpose of a public key in asymmetric cryptographyUsed for encryption or verifying digital signatures
What is the role of a cryptographic saltTo add randomness to hashes and protect against precomputed attacks like rainbow tables
Front
What is the difference between a stream cipher and a block cipher
Click the card to flip
Back
Stream ciphers encrypt data sequentially while block ciphers encrypt data in fixed-size blocks
Front
What is key exchange
Back
The process of securely sharing encryption keys between parties
Front
What is symmetric encryption
Back
Encryption method where the same key is used for both encryption and decryption
Front
What is a certificate authority (CA)
Back
An entity that issues digital certificates to authenticate the identity of organizations and individuals
Front
What is the purpose of a private key in asymmetric cryptography
Back
Used for decryption or creating digital signatures
Front
What is an example of an asymmetric encryption algorithm
Back
RSA
Front
What is the role of a cryptographic salt
Back
To add randomness to hashes and protect against precomputed attacks like rainbow tables
Front
What is the purpose of a public key in asymmetric cryptography
Back
Used for encryption or verifying digital signatures
Front
What does SSL/TLS use for encryption
Back
A combination of symmetric and asymmetric encryption techniques
Front
What is a digital signature
Back
A cryptographic method for verifying the authenticity and integrity of a digital message or document
Front
What is the primary purpose of cryptography
Back
Ensuring confidentiality, integrity, authentication, and non-repudiation of data
Front
What is a brute force attack
Back
Method of cracking encryption by systematically testing all possible keys
Front
What is a hash function
Back
A function that converts input data into a fixed-size unique string called a hash
Front
What is the difference between encryption and hashing
Back
Encryption is reversible with a key while hashing is one-way and irreversible
Front
What is a Cipher
Back
An algorithm for performing encryption or decryption
Front
What is the difference between MD5 and SHA-256
Back
SHA-256 produces a stronger and longer hash compared to the older and compromised MD5 algorithm
Front
What is the main weakness of symmetric encryption
Back
Key distribution since both parties need access to the same secret key
Front
What is an example of a symmetric encryption algorithm
Back
AES
Front
What is asymmetric encryption
Back
Encryption method where a pair of keys (public and private) is used
Front
What is key length's importance in cryptography
Back
Longer keys provide stronger security against brute force attacks
1/20
This deck covers encryption methods, hashing, digital signatures, and the foundational principles of cryptographic techniques in cybersecurity.
Share on...
Follow us on...