Bash, the Crucial Exams Chat Bot
AI Bot
ISC2 CISSP - Cryptography Fundamentals Flashcards
Front | Back |
Asymmetric encryption uses a pair of keys: a public key and a private key. | True |
In the encryption lifecycle | what phase involves key generation?,Key Management |
Symmetric encryption uses the same key for both encryption and decryption. | True |
What algorithm is commonly used for secure key exchange in asymmetric cryptography? | Diffie-Hellman |
What does AES stand for? | Advanced Encryption Standard |
What is a man-in-the-middle attack? | An attack where the adversary secretly intercepts and possibly alters the communication between two parties |
What is a nonce? | A number used once to ensure freshness in cryptographic communication |
What is digital signature used for? | To ensure non-repudiation and data integrity |
What is entropy in the context of cryptography? | A measure of randomness or unpredictability in a key or system |
What is public key infrastructure (PKI)? | A framework of policies and services to create, manage, distribute, and revoke digital certificates |
What is steganography? | The practice of hiding messages within other non-secret text or data |
What is the main difference between block ciphers and stream ciphers? | Block ciphers encrypt fixed-size blocks of data, while stream ciphers encrypt data one bit or byte at a time |
What is the primary goal of cryptography? | To protect the confidentiality, integrity, and authenticity of information |
What is the purpose of a cryptographic hash function? | To produce a fixed-size unique representation of data |
What is the purpose of an Initialization Vector (IV)? | To ensure that the same plaintext encrypts to different ciphertexts each time |
What is the role of a Certificate Authority (CA)? | To issue digital certificates that authenticate the identity of entities |
What protocol is widely used to secure web traffic? | TLS (Transport Layer Security) |
What protocol provides secure email communication? | S/MIME (Secure/Multipurpose Internet Mail Extensions) |
Which cipher mode combines the IV with the first plaintext block. | CBC (Cipher Block Chaining) |
Front
Asymmetric encryption uses a pair of keys: a public key and a private key.
Click the card to flip
Back
True
Front
What is a nonce?
Back
A number used once to ensure freshness in cryptographic communication
Front
Which cipher mode combines the IV with the first plaintext block.
Back
CBC (Cipher Block Chaining)
Front
What is entropy in the context of cryptography?
Back
A measure of randomness or unpredictability in a key or system
Front
What is digital signature used for?
Back
To ensure non-repudiation and data integrity
Front
What is the purpose of a cryptographic hash function?
Back
To produce a fixed-size unique representation of data
Front
What protocol provides secure email communication?
Back
S/MIME (Secure/Multipurpose Internet Mail Extensions)
Front
What is steganography?
Back
The practice of hiding messages within other non-secret text or data
Front
What is a man-in-the-middle attack?
Back
An attack where the adversary secretly intercepts and possibly alters the communication between two parties
Front
What is the purpose of an Initialization Vector (IV)?
Back
To ensure that the same plaintext encrypts to different ciphertexts each time
Front
What is the main difference between block ciphers and stream ciphers?
Back
Block ciphers encrypt fixed-size blocks of data, while stream ciphers encrypt data one bit or byte at a time
Front
What algorithm is commonly used for secure key exchange in asymmetric cryptography?
Back
Diffie-Hellman
Front
What is the primary goal of cryptography?
Back
To protect the confidentiality, integrity, and authenticity of information
Front
What does AES stand for?
Back
Advanced Encryption Standard
Front
What protocol is widely used to secure web traffic?
Back
TLS (Transport Layer Security)
Front
In the encryption lifecycle
Back
what phase involves key generation?,Key Management
Front
What is the role of a Certificate Authority (CA)?
Back
To issue digital certificates that authenticate the identity of entities
Front
Symmetric encryption uses the same key for both encryption and decryption.
Back
True
Front
What is public key infrastructure (PKI)?
Back
A framework of policies and services to create, manage, distribute, and revoke digital certificates
1/19
This deck explores cryptographic concepts, protocols, algorithms, and applications, as well as encryption lifecycle and implementation practices.