Bash, the Crucial Exams Chat Bot
AI Bot
Cryptography Basics Flashcards
ISC2 Certified in Cybersecurity (CC) Flashcards
| Front | Back |
| What does SSL/TLS use for encryption | A combination of symmetric and asymmetric encryption techniques |
| What is a brute force attack | Method of cracking encryption by systematically testing all possible keys |
| What is a certificate authority (CA) | An entity that issues digital certificates to authenticate the identity of organizations and individuals |
| What is a Cipher | An algorithm for performing encryption or decryption |
| What is a digital signature | A cryptographic method for verifying the authenticity and integrity of a digital message or document |
| What is a hash function | A function that converts input data into a fixed-size unique string called a hash |
| What is an example of a symmetric encryption algorithm | AES |
| What is an example of an asymmetric encryption algorithm | RSA |
| What is asymmetric encryption | Encryption method where a pair of keys (public and private) is used |
| What is key exchange | The process of securely sharing encryption keys between parties |
| What is key length's importance in cryptography | Longer keys provide stronger security against brute force attacks |
| What is symmetric encryption | Encryption method where the same key is used for both encryption and decryption |
| What is the difference between a stream cipher and a block cipher | Stream ciphers encrypt data sequentially while block ciphers encrypt data in fixed-size blocks |
| What is the difference between encryption and hashing | Encryption is reversible with a key while hashing is one-way and irreversible |
| What is the difference between MD5 and SHA-256 | SHA-256 produces a stronger and longer hash compared to the older and compromised MD5 algorithm |
| What is the main weakness of symmetric encryption | Key distribution since both parties need access to the same secret key |
| What is the primary purpose of cryptography | Ensuring confidentiality, integrity, authentication, and non-repudiation of data |
| What is the purpose of a private key in asymmetric cryptography | Used for decryption or creating digital signatures |
| What is the purpose of a public key in asymmetric cryptography | Used for encryption or verifying digital signatures |
| What is the role of a cryptographic salt | To add randomness to hashes and protect against precomputed attacks like rainbow tables |
Front
What is the main weakness of symmetric encryption
Click the card to flip
Back
Key distribution since both parties need access to the same secret key
Front
What is an example of a symmetric encryption algorithm
Back
AES
Front
What is a brute force attack
Back
Method of cracking encryption by systematically testing all possible keys
Front
What is symmetric encryption
Back
Encryption method where the same key is used for both encryption and decryption
Front
What is key exchange
Back
The process of securely sharing encryption keys between parties
Front
What is the purpose of a public key in asymmetric cryptography
Back
Used for encryption or verifying digital signatures
Front
What is the difference between MD5 and SHA-256
Back
SHA-256 produces a stronger and longer hash compared to the older and compromised MD5 algorithm
Front
What is the difference between a stream cipher and a block cipher
Back
Stream ciphers encrypt data sequentially while block ciphers encrypt data in fixed-size blocks
Front
What is key length's importance in cryptography
Back
Longer keys provide stronger security against brute force attacks
Front
What is a certificate authority (CA)
Back
An entity that issues digital certificates to authenticate the identity of organizations and individuals
Front
What is the role of a cryptographic salt
Back
To add randomness to hashes and protect against precomputed attacks like rainbow tables
Front
What is an example of an asymmetric encryption algorithm
Back
RSA
Front
What is a digital signature
Back
A cryptographic method for verifying the authenticity and integrity of a digital message or document
Front
What is asymmetric encryption
Back
Encryption method where a pair of keys (public and private) is used
Front
What is the difference between encryption and hashing
Back
Encryption is reversible with a key while hashing is one-way and irreversible
Front
What is the primary purpose of cryptography
Back
Ensuring confidentiality, integrity, authentication, and non-repudiation of data
Front
What does SSL/TLS use for encryption
Back
A combination of symmetric and asymmetric encryption techniques
Front
What is a Cipher
Back
An algorithm for performing encryption or decryption
Front
What is the purpose of a private key in asymmetric cryptography
Back
Used for decryption or creating digital signatures
Front
What is a hash function
Back
A function that converts input data into a fixed-size unique string called a hash
1/20
This deck covers encryption methods, hashing, digital signatures, and the foundational principles of cryptographic techniques in cybersecurity.