Bash, the Crucial Exams Chat Bot
AI Bot

Cryptography Basics  Flashcards

ISC2 Certified in Cybersecurity (CC) Flashcards

FrontBack
What does SSL/TLS use for encryptionA combination of symmetric and asymmetric encryption techniques
What is a brute force attackMethod of cracking encryption by systematically testing all possible keys
What is a certificate authority (CA)An entity that issues digital certificates to authenticate the identity of organizations and individuals
What is a CipherAn algorithm for performing encryption or decryption
What is a digital signatureA cryptographic method for verifying the authenticity and integrity of a digital message or document
What is a hash functionA function that converts input data into a fixed-size unique string called a hash
What is an example of a symmetric encryption algorithmAES
What is an example of an asymmetric encryption algorithmRSA
What is asymmetric encryptionEncryption method where a pair of keys (public and private) is used
What is key exchangeThe process of securely sharing encryption keys between parties
What is key length's importance in cryptographyLonger keys provide stronger security against brute force attacks
What is symmetric encryptionEncryption method where the same key is used for both encryption and decryption
What is the difference between a stream cipher and a block cipherStream ciphers encrypt data sequentially while block ciphers encrypt data in fixed-size blocks
What is the difference between encryption and hashingEncryption is reversible with a key while hashing is one-way and irreversible
What is the difference between MD5 and SHA-256SHA-256 produces a stronger and longer hash compared to the older and compromised MD5 algorithm
What is the main weakness of symmetric encryptionKey distribution since both parties need access to the same secret key
What is the primary purpose of cryptographyEnsuring confidentiality, integrity, authentication, and non-repudiation of data
What is the purpose of a private key in asymmetric cryptographyUsed for decryption or creating digital signatures
What is the purpose of a public key in asymmetric cryptographyUsed for encryption or verifying digital signatures
What is the role of a cryptographic saltTo add randomness to hashes and protect against precomputed attacks like rainbow tables
This deck covers encryption methods, hashing, digital signatures, and the foundational principles of cryptographic techniques in cybersecurity.
Share on...
Follow us on...