• Shuffle
    Toggle On
    Toggle Off
  • Alphabetize
    Toggle On
    Toggle Off
  • Front First
    Toggle On
    Toggle Off
  • Both Sides
    Toggle On
    Toggle Off
  • Read
    Toggle On
    Toggle Off
Reading...
Front

Card Range To Study

through

image

Play button

image

Play button

image

Progress

1/58

Click to flip

Use LEFT and RIGHT arrow keys to navigate between flashcards;

Use UP and DOWN arrow keys to flip the card;

H to show hint;

A reads text to speech;

58 Cards in this Set

  • Front
  • Back

Public encrypts; private decrypts in what encryption type?

Asymmetric encryption

Function which creates a signature of a file. Helps in proving integrity.

Hash function

Study of protecting information, whether in transit or at rest.

Cryptography

Data to be encrypted.

Plaintext

In cryptography, the term for encrypted data

Ciphertext

Rendering sender unable to deny they sent something.

Nonrepudiation

Cipher method in which bits are encyrpted one bit at a time.

Stream Cipher

Encrypted in sets of data, usually 64 bits at a time

Block cipher

Substitution and transposition are algorithms used in which encryption method.

Block Cipher

Primary algorithm used in stream cipher.

XOR operation

Speed is a benefit of which encryption method.

Symmetric

XOR Operation weakness

If the key is smaller than the data, successful cryptanalysis is possible via frequency attack

De Facto encryption standard

RSA

multiplies two prime numbers.

RSA

Key size up to 4096

RSA

Used for encryption and digital signatures

RSA

Key Escrow

Repository for government encryption access when there are legal issues, such as subpoenas

Asymmetric encryption disadvantage

Requires large encryption keys.

IDEA

used mainly in Europe

RC

Rivest Cipher

RC4 cypher type

Stream

RC5 cipher type

block

RC6 cipher type

Block

Symmetric Encryption AKA (4)

Single / secret / shared / private

Symmetric Encryption drawbacks (2)

Key sharing is complicated / Scalability

Typical data block size of symmetric key encryption

64 bits

Encryption method which replaces character with another character, or bit with another bit.

Substitution

Transposition (def)

Scramble the characters

Diffie-Hellman encryption type

asymmetric

Diffie-Hellman used in which two protocols

Encryption used in IPSEC and SSL protocols

Diffie-Hellman vulnerable to...

Vulnerable to man-in-the-middle attacks (MITM) when digital signature use is waived

ECC

Elliptic Curve Cryptosystem

Elliptic Curve Cryptosystem (ECC)used on what devices?

Encryption method used by mobile devices

Elliptic Curve Cryptosystem (ECC) benefit

Uses less computational power

El Gamal (difference from RSA)

Encryption method not based on prime number factoring

El Gamal algorithm

Uses discrete logarithm problems for encryption and digital signatures

First government accepted digital signature scheme

DSA

First government accepted digital signature scheme; it meets Digital Signature Standard (DSS), one of the Federal Information Processing Standards (FIPS)

DSA

Hash function(definition)

Any algorithm that maps data of variable length to data of a fixed length

Results of hashing function (5 synonyms)

hashes, hash values, hash codes, hash sums, checksums

Used to crack a hash algorithm

Collision attack

Collision (hash, definition)

When 2 or more files create the same output from a hash function

PKI

Public Key Infrastructure

CA

Certificate authority

RA

Registration Authority

Trust Models (3)

Web of Trust / Single authority System / Hierarchical Trust System

Web of Trust

User trust certificates they have exchanged with another person, and further they trust everyone who the other person trusts and so on

Single authority System

There is one entity which holds all certificates-the Certificate Authority

Hierarchical Trust System

There is a certificate authority at the top and then all the entities below it which are trusted by the certificate authority to do their job on their behalf

Fields in a digital certificate (8)

Public key, Serial Number, Subject/Algorithm, Issuer, Valid From date, Valid To date, Key Usage (purpose of use), optional fields

Current PKI world standard version number

X.509

key size is deemed by the US government as uncrackable

256

Avenues of encrypted communications

(SSIP) Secure shell (SSH) / Secure Socket Layer (SSL) / Internet Protocol Security (IPSec) / Point-to-point tunneling Protocol (PPTP)

Two things to ensure your encryption is effectively uncrackable

Use a large key, Change the key on a regular basis

Encryption algorithms turn what into what?

Plaintext into ciphertext

When both parties cannot deny the message was sent /received

Non-repudiation

Encryption method which cannot be broken if the message is truly random, used only once and has no repeating patterns

One-time pad

Name three problems which symmetric encryption algorithms have that asymmetric encryption algorithms do not

Scalability issue / key exchange issue / lack of non-repudiation