IncidentResponseWhiteHatHackerSteganographyThis concealsdata in anotherfiles such asgraphics, audioor video fileRansomwareencrypting thecontents of asystem anddemandingpayment torecoverIVpseudorandom valueensures that plaintextinput does notproduce the sameciphertext output,even when the sameencryption key isused. TokenizationRSAAsymmetricalgo thatfactors verylarge integers;2048 min keysizeINVENTOROF WWWTimBerners-LeeVPN(VirtualPrivateNetwork)PatchMalwareEncryptionreversible processthat converts datainto an unreadableformat, and thenback to its originalform.BlackHatHackerAntivirusAccessControlSANcovermultipledomainsor URLs codesigningcertsused by appdevelopers;run at yourown riskRootkitIDEAdeprecatedblock cipheralgoreplaced byAESINVENTOROF TCPBOBKAHNDESlegacyblock ciphersymmetricalgoAESasymmetricalgo widelyusedinventorof theInternetDoDXORcomparestwo inputsand producesa singlebinary outputCAissues allcertificatesto endusersCryptographyfastadvantageofsymmetricalgosPhishingCRLrevokedS/N thathave beeninvalidatedFirewallconsideredlayers 4-7port69TFTPPGPa symmetricalgorithmused foremail andSMSfixitypreservationor integrityElgamalused for PKencryptionwith DHand PGPIntrusionDetectionSystem(IDS)AsymmetricalgorithmDESHashingone waymathematicalfunction easyto compute butirreversibleNullingcompletelypreventsvisibility ofthe dataSSLWebsecuritythat’s nowantiquatedintermediateCASubordinateswho validateissuing CAs BiometricAuthenticationDHAsymmetric Algogenerally usedto generate ashared key overa public networkSocialEngineering53portnumberfor DNSNIST (NationalInstitute ofStandards andTechnology)256highestblock sizefor AES143portused foremailsCBCcombiningblocks andan IV usingan XORoperationIncidentResponseWhiteHatHackerSteganographyThis concealsdata in anotherfiles such asgraphics, audioor video fileRansomwareencrypting thecontents of asystem anddemandingpayment torecoverIVpseudorandom valueensures that plaintextinput does notproduce the sameciphertext output,even when the sameencryption key isused. TokenizationRSAAsymmetricalgo thatfactors verylarge integers;2048 min keysizeINVENTOROF WWWTimBerners-LeeVPN(VirtualPrivateNetwork)PatchMalwareEncryptionreversible processthat converts datainto an unreadableformat, and thenback to its originalform.BlackHatHackerAntivirusAccessControlSANcovermultipledomainsor URLs codesigningcertsused by appdevelopers;run at yourown riskRootkitIDEAdeprecatedblock cipheralgoreplaced byAESINVENTOROF TCPBOBKAHNDESlegacyblock ciphersymmetricalgoAESasymmetricalgo widelyusedinventorof theInternetDoDXORcomparestwo inputsand producesa singlebinary outputCAissues allcertificatesto endusersCryptographyfastadvantageofsymmetricalgosPhishingCRLrevokedS/N thathave beeninvalidatedFirewallconsideredlayers 4-7port69TFTPPGPa symmetricalgorithmused foremail andSMSfixitypreservationor integrityElgamalused for PKencryptionwith DHand PGPIntrusionDetectionSystem(IDS)AsymmetricalgorithmDESHashingone waymathematicalfunction easyto compute butirreversibleNullingcompletelypreventsvisibility ofthe dataSSLWebsecuritythat’s nowantiquatedintermediateCASubordinateswho validateissuing CAs BiometricAuthenticationDHAsymmetric Algogenerally usedto generate ashared key overa public networkSocialEngineering53portnumberfor DNSNIST (NationalInstitute ofStandards andTechnology)256highestblock sizefor AES143portused foremailsCBCcombiningblocks andan IV usingan XORoperation

Crypto Bingo - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
  1. Incident Response
  2. White Hat Hacker
  3. This conceals data in another files such as graphics, audio or video file
    Steganography
  4. encrypting the contents of a system and demanding payment to recover
    Ransomware
  5. pseudorandom value ensures that plaintext input does not produce the same ciphertext output, even when the same encryption key is used. 
    IV
  6. Tokenization
  7. Asymmetric algo that factors very large integers; 2048 min key size
    RSA
  8. Tim Berners-Lee
    INVENTOR OF WWW
  9. VPN (Virtual Private Network)
  10. Patch
  11. Malware
  12. reversible process that converts data into an unreadable format, and then back to its original form.
    Encryption
  13. Black Hat Hacker
  14. Antivirus
  15. Access Control
  16. cover multiple domains or URLs
    SAN
  17. used by app developers; run at your own risk
    code signing certs
  18. Rootkit
  19. deprecated block cipher algo replaced by AES
    IDEA
  20. BOB KAHN
    INVENTOR OF TCP
  21. legacy block cipher symmetric algo
    DES
  22. a symmetric algo widely used
    AES
  23. DoD
    inventor of the Internet
  24. compares two inputs and produces a single binary output
    XOR
  25. issues all certificates to end users
    CA
  26. Cryptography
  27. advantage of symmetric algos
    fast
  28. Phishing
  29. revoked S/N that have been invalidated
    CRL
  30. considered layers 4-7
    Firewall
  31. TFTP
    port 69
  32. a symmetric algorithm used for email and SMS
    PGP
  33. preservation or integrity
    fixity
  34. used for PK encryption with DH and PGP
    Elgamal
  35. Intrusion Detection System (IDS)
  36. DES
    A symmetric algorithm
  37. one way mathematical function easy to compute but irreversible
    Hashing
  38. completely prevents visibility of the data
    Nulling
  39. Web security that’s now antiquated
    SSL
  40. Subordinates who validate issuing CAs
    intermediate CA
  41. Biometric Authentication
  42. Asymmetric Algo generally used to generate a shared key over a public network
    DH
  43. Social Engineering
  44. port number for DNS
    53
  45. NIST (National Institute of Standards and Technology)
  46. highest block size for AES
    256
  47. port used for emails
    143
  48. combining blocks and an IV using an XOR operation
    CBC