Bash, the Crucial Exams Chat Bot
AI Bot
Cryptography Basics Flashcards
ISC2 Certified in Cybersecurity (CC) Flashcards
| Front | Back |
| What does SSL/TLS use for encryption | A combination of symmetric and asymmetric encryption techniques |
| What is a brute force attack | Method of cracking encryption by systematically testing all possible keys |
| What is a certificate authority (CA) | An entity that issues digital certificates to authenticate the identity of organizations and individuals |
| What is a Cipher | An algorithm for performing encryption or decryption |
| What is a digital signature | A cryptographic method for verifying the authenticity and integrity of a digital message or document |
| What is a hash function | A function that converts input data into a fixed-size unique string called a hash |
| What is an example of a symmetric encryption algorithm | AES |
| What is an example of an asymmetric encryption algorithm | RSA |
| What is asymmetric encryption | Encryption method where a pair of keys (public and private) is used |
| What is key exchange | The process of securely sharing encryption keys between parties |
| What is key length's importance in cryptography | Longer keys provide stronger security against brute force attacks |
| What is symmetric encryption | Encryption method where the same key is used for both encryption and decryption |
| What is the difference between a stream cipher and a block cipher | Stream ciphers encrypt data sequentially while block ciphers encrypt data in fixed-size blocks |
| What is the difference between encryption and hashing | Encryption is reversible with a key while hashing is one-way and irreversible |
| What is the difference between MD5 and SHA-256 | SHA-256 produces a stronger and longer hash compared to the older and compromised MD5 algorithm |
| What is the main weakness of symmetric encryption | Key distribution since both parties need access to the same secret key |
| What is the primary purpose of cryptography | Ensuring confidentiality, integrity, authentication, and non-repudiation of data |
| What is the purpose of a private key in asymmetric cryptography | Used for decryption or creating digital signatures |
| What is the purpose of a public key in asymmetric cryptography | Used for encryption or verifying digital signatures |
| What is the role of a cryptographic salt | To add randomness to hashes and protect against precomputed attacks like rainbow tables |
This deck covers encryption methods, hashing, digital signatures, and the foundational principles of cryptographic techniques in cybersecurity.