Security+ (SY0-701): Cryptographic Solutions Part 1
This deck covers essential concepts in cryptography, including definitions, types of encryption, hashing algorithms, and Public Key Infrastructure (PKI).
Define ‘Cryptography’
Key Terms
Related Flashcard Decks
Study Tips
- Press F to enter focus mode for distraction-free studying
- Review cards regularly to improve retention
- Try to recall the answer before flipping the card
- Share this deck with friends to study together
Term | Definition |
---|---|
Define ‘Cryptography’ | The science and practice of encoding or decoding data to make it unintelligible to unauthorized parties. |
Define ‘security through obscurity’ | Keeping something a secret by hiding it. |
Define ‘Plaintext/Cleartext’ | Unencrypted data. |
Define ‘Ciphertext’ | Encrypted data that can’t be read without the cipher key. |
Define an ‘Algorithm’ | Process that encrypts and decrypts data. |
Define ‘Cryptanalysis’ | The science/practice of breaking ciphers and cryptographic systems. |
Define an ‘Encryption’ algorithm/cipher | Process that encodes data so that it can be stored or transmitted securely and then decrypted only by its owner or its intended recipient. |
Define a ‘key’ in cryptography | Specific piece of data that is used in an algorithm to perform encryption and decryption. |
What are the two types of encryption algorithms? |
|
Define a ‘substitution’ cipher/algorithm | Replacing characters or blocks in the plaintext with different text or ciphertext. |
Define a ‘Transposition’ cipher/algorithm | The units of data stay the same, but their order is changed depending on the mechanism. |
Define ‘Symmetric Encryption’ | Shared-key encryption; Two-way encryption process in which encryption and decryption are both performed by the same key. |
What is the benefit of symmetric encryption? | Used for bulk encryption of large amounts of data due to its speed; Very fast |
What is the security risk in symmetric encryption? | The transmission/receipt of the shared-key; Security is broken if the key is intercepted along with the cipher text. |
Define ‘key length’ | Size of a cryptographic key in bits; Longer keys generally offer better security and are harder to crack with brute force. |
What is the downside to using larger encryption keys? | The computer must use more resources to perform encryption and decryption. |
Define ‘Asymmetric Encryption’ | One-way encryption; Cipher that uses public and private keys mathematically linked by RSA or ECC algorithms; |
What is the difference between asymmetric encryption and symmetric encryption? | An asymmetric key cannot reverse the operation it performs; The public key cannot decrypt what it has encrypted and vice versa. |
What is the function of the public key in asymmetric encryption? | Key is freely distributed and can be used to perform reverse encryption or decryption operation of the linked private key in the pair. |
What is the function of the private key in asymmetric encryption? | Uniquely associated with the owner and is not made public; Used to encrypt data that can be decrypted by the linked public key or vice versa. |
What is a downfall of asymmetric encryption? | Involves substantial computing overhead compared to symmetric encryption and is inefficient for large amounts of data. |
How can the overhead from asymmetric encryption be mitigated with large amounts of data? | Asymmetric encryption can be used to encrypt a symmetric key that was used to encrypt data before transmitting the data. |
Define ‘cryptographic hashing’ algorithms | One-way encryption that produces a fixed-length string of bits from a plaintext input. |
What does a hashing algorithm produce? | The output is a ‘hash’ or ‘message digest’ |
What is the typical function/purpose of hashing algorithms? | To prove integrity; Ensure that data has not been manipulated in transmission/receipt/storage and for authentication. |
What are the two popular hashing algorithms? |
|
Define 'Secure Hash Algorithm (SHA)' | Replacement for message digest algorithm (MDA); Considered strongest - most popular is SHA256 producing a 256-bit digest. |
Define 'Message Digest Algorithm #5 (MD5)' | Considered not as safe as SHA256; Produces a 128-bit digest. |
Define a 'cryptographic primitive' | A single hash function, symmetric cipher, or asymmetric cipher. |
Define a 'complete cryptographic system/product' | The use of multiple cryptographic primitives within a cipher suite. |
What two forms of cryptography combine to create a digital signature? | Combines Asymmetric encryption for confidentiality to authenticating the sender with hashing to provide integrity. |
What is 'Public Key Infrastructure (PKI)' | Framework that establishes trust in the use of public key cryptography to sign and encrypt messages via digital certificates. |
What is the purpose of Public Key Infrastructure (PKI)? | To prove the owners of public keys are who they say they are. |
Define a 'Digital Certificate' | A public assertion of identity, authenticated by a certificate authority (CA) that contains a subject's public key. |
Define a 'certificate authority (CA)' | A server that guarantees subject identities by issuing signed digital certificate wrappers for their public keys. |
What is a 3rd party certificate authority (CA)? | A public CA that issues certificates for multiple domains; Widely trusted as a root trust by operating systems and browsers. |
What purpose of a 3rd party public CA? |
|
How does a subject generate a certificate from a public 3rd party root CA? |
|
Define a 'digitally signed certificate' | Proof that a cert was validly issued to a subject (user/host) by a public 3rd party root CA. |
When going to a URL, how does the client verify identity? | Client checks web server's certificate and validates that it is signed by a trusted CA. |