Cryptography Basics Flashcards
ISC2 Certified in Cybersecurity (CC) Flashcards

| Front | Back |
| What does SSL/TLS use for encryption | A combination of symmetric and asymmetric encryption techniques |
| What is a brute force attack | Method of cracking encryption by systematically testing all possible keys |
| What is a certificate authority (CA) | An entity that issues digital certificates to authenticate the identity of organizations and individuals |
| What is a Cipher | An algorithm for performing encryption or decryption |
| What is a digital signature | A cryptographic method for verifying the authenticity and integrity of a digital message or document |
| What is a hash function | A function that converts input data into a fixed-size unique string called a hash |
| What is an example of a symmetric encryption algorithm | AES |
| What is an example of an asymmetric encryption algorithm | RSA |
| What is asymmetric encryption | Encryption method where a pair of keys (public and private) is used |
| What is key exchange | The process of securely sharing encryption keys between parties |
| What is key length's importance in cryptography | Longer keys provide stronger security against brute force attacks |
| What is symmetric encryption | Encryption method where the same key is used for both encryption and decryption |
| What is the difference between a stream cipher and a block cipher | Stream ciphers encrypt data sequentially while block ciphers encrypt data in fixed-size blocks |
| What is the difference between encryption and hashing | Encryption is reversible with a key while hashing is one-way and irreversible |
| What is the difference between MD5 and SHA-256 | SHA-256 produces a stronger and longer hash compared to the older and compromised MD5 algorithm |
| What is the main weakness of symmetric encryption | Key distribution since both parties need access to the same secret key |
| What is the primary purpose of cryptography | Ensuring confidentiality, integrity, authentication, and non-repudiation of data |
| What is the purpose of a private key in asymmetric cryptography | Used for decryption or creating digital signatures |
| What is the purpose of a public key in asymmetric cryptography | Used for encryption or verifying digital signatures |
| What is the role of a cryptographic salt | To add randomness to hashes and protect against precomputed attacks like rainbow tables |
About the Flashcards
Flashcards for the ISC2 Certified in Cybersecurity (CC) exam focus on essential cryptography terminology you need to recall on test day. Each card delivers concise definitions that clarify how data confidentiality, integrity, authentication, and non-repudiation are achieved.
Review the strengths and weaknesses of AES, RSA, stream and block ciphers; compare MD5 with SHA-256; and understand how salts, key length, and key exchange protect against brute-force and rainbow-table attacks. The deck also explains digital signatures, certificate authorities, and the hybrid encryption model used in SSL/TLS, helping you quickly connect theoretical concepts with real-world applications likely to appear on the exam.
Topics covered in this flashcard deck:
- Symmetric vs asymmetric encryption
- Hashing and hash algorithms
- Digital signatures & PKI
- Key management & exchange
- Cryptographic attacks and defenses