Use LEFT and RIGHT arrow keys to navigate between flashcards;
Use UP and DOWN arrow keys to flip the card;
H to show hint;
A reads text to speech;
58 Cards in this Set
- Front
- Back
Public encrypts; private decrypts in what encryption type? |
Asymmetric encryption |
|
Function which creates a signature of a file. Helps in proving integrity. |
Hash function |
|
Study of protecting information, whether in transit or at rest. |
Cryptography |
|
Data to be encrypted. |
Plaintext |
|
In cryptography, the term for encrypted data |
Ciphertext |
|
Rendering sender unable to deny they sent something. |
Nonrepudiation |
|
Cipher method in which bits are encyrpted one bit at a time. |
Stream Cipher |
|
Encrypted in sets of data, usually 64 bits at a time |
Block cipher |
|
Substitution and transposition are algorithms used in which encryption method. |
Block Cipher |
|
Primary algorithm used in stream cipher. |
XOR operation |
|
Speed is a benefit of which encryption method. |
Symmetric |
|
XOR Operation weakness |
If the key is smaller than the data, successful cryptanalysis is possible via frequency attack |
|
De Facto encryption standard |
RSA |
|
multiplies two prime numbers. |
RSA |
|
Key size up to 4096 |
RSA |
|
Used for encryption and digital signatures |
RSA |
|
Key Escrow |
Repository for government encryption access when there are legal issues, such as subpoenas |
|
Asymmetric encryption disadvantage |
Requires large encryption keys. |
|
IDEA |
used mainly in Europe |
|
RC |
Rivest Cipher |
|
RC4 cypher type |
Stream |
|
RC5 cipher type |
block |
|
RC6 cipher type |
Block |
|
Symmetric Encryption AKA (4) |
Single / secret / shared / private |
|
Symmetric Encryption drawbacks (2) |
Key sharing is complicated / Scalability |
|
Typical data block size of symmetric key encryption |
64 bits |
|
Encryption method which replaces character with another character, or bit with another bit. |
Substitution |
|
Transposition (def) |
Scramble the characters |
|
Diffie-Hellman encryption type |
asymmetric |
|
Diffie-Hellman used in which two protocols |
Encryption used in IPSEC and SSL protocols |
|
Diffie-Hellman vulnerable to... |
Vulnerable to man-in-the-middle attacks (MITM) when digital signature use is waived |
|
ECC |
Elliptic Curve Cryptosystem |
|
Elliptic Curve Cryptosystem (ECC)used on what devices? |
Encryption method used by mobile devices |
|
Elliptic Curve Cryptosystem (ECC) benefit |
Uses less computational power |
|
El Gamal (difference from RSA) |
Encryption method not based on prime number factoring |
|
El Gamal algorithm |
Uses discrete logarithm problems for encryption and digital signatures |
|
First government accepted digital signature scheme |
DSA |
|
First government accepted digital signature scheme; it meets Digital Signature Standard (DSS), one of the Federal Information Processing Standards (FIPS) |
DSA |
|
Hash function(definition) |
Any algorithm that maps data of variable length to data of a fixed length |
|
Results of hashing function (5 synonyms) |
hashes, hash values, hash codes, hash sums, checksums |
|
Used to crack a hash algorithm |
Collision attack |
|
Collision (hash, definition) |
When 2 or more files create the same output from a hash function |
|
PKI |
Public Key Infrastructure |
|
CA |
Certificate authority |
|
RA |
Registration Authority |
|
Trust Models (3) |
Web of Trust / Single authority System / Hierarchical Trust System |
|
Web of Trust |
User trust certificates they have exchanged with another person, and further they trust everyone who the other person trusts and so on |
|
Single authority System |
There is one entity which holds all certificates-the Certificate Authority |
|
Hierarchical Trust System |
There is a certificate authority at the top and then all the entities below it which are trusted by the certificate authority to do their job on their behalf |
|
Fields in a digital certificate (8) |
Public key, Serial Number, Subject/Algorithm, Issuer, Valid From date, Valid To date, Key Usage (purpose of use), optional fields |
|
Current PKI world standard version number |
X.509 |
|
key size is deemed by the US government as uncrackable |
256 |
|
Avenues of encrypted communications |
(SSIP) Secure shell (SSH) / Secure Socket Layer (SSL) / Internet Protocol Security (IPSec) / Point-to-point tunneling Protocol (PPTP) |
|
Two things to ensure your encryption is effectively uncrackable |
Use a large key, Change the key on a regular basis |
|
Encryption algorithms turn what into what? |
Plaintext into ciphertext |
|
When both parties cannot deny the message was sent /received |
Non-repudiation |
|
Encryption method which cannot be broken if the message is truly random, used only once and has no repeating patterns |
One-time pad |
|
Name three problems which symmetric encryption algorithms have that asymmetric encryption algorithms do not |
Scalability issue / key exchange issue / lack of non-repudiation |