Use LEFT and RIGHT arrow keys to navigate between flashcards;
Use UP and DOWN arrow keys to flip the card;
H to show hint;
A reads text to speech;
45 Cards in this Set
- Front
- Back
Cryptography Notation
|
name-w/r/b
example: RC5-32/12/16 w=Word Size (bits), r=Rounds, b=Bytes (x4=bits) |
|
DES - Name
|
Data Encryption Standard
|
|
DES - Algorithm
|
DEA - Data Encryption Algorithm (altered form of Lucifer)
Symmetric 64/16/56 |
|
Lucifer
|
Chosen for DES and renamed DEA
|
|
DES - Modes
|
ECB - Code Book, No Chaining
CBC - Block Chaining CFB - Cipher Feedback OFB - Output Feedback CTR - Counter |
|
3DES - Name
|
Triple Data Encryption Algorithm
|
|
3DES - Algorithm
|
Triple DEA
Symmetric 64/48/56 |
|
3DES - Modes
|
EEE3
EDE3 EEE2 EDE2 E = Encryption, D = Decryption Decryption during Encryption uses a different key |
|
3DES - Why was it developed
|
Quick fix of DES before AES was ready
|
|
AES - Name
|
Advanced Encryption Standard
|
|
AES - Algorithm
|
Rijndael
Symmetric 128/10/32 192/12/48 256/14/64 |
|
IDEA - Name
|
International Data Encryption Algorithm
Patented Used by PGP |
|
IDEA - Algorithm
|
Symmetric
64bit / 16 128 key |
|
Blowfish
|
Symmetric
64/16/32-448 bit Public Domain |
|
RC4
|
Symmetric
Stream Improperly used in Wireless and will be replaced with 802.11i Proprietary but source published under name ARC4 |
|
RC5
|
Symmetric
Block 32,64,128/1-255/1-2048 |
|
RC6
|
Symmetric
Block Improved upon RC5 - speed increase 32,64,128/1-255/1-2048 |
|
Symmetric Strengths / Asymmetric Strengths
|
Symmetric:
Much Faster With large keys, hard to break Provides Confidentiality (but not authenticity and non-repudiation) Asymmetric: Key Management (Allows Public Key use) - Distribution and Scaling Can provide Authentication and Non-repudiation |
|
Diffie-Heliman Algorithm
|
Asymmetric - The first agreement algorithm
Used to create a Symmetric key on both sides using local private and remove public |
|
RSA
|
Defacto standard for digital signatures, key exchange, and encryption.
Uses large numbers factoring into their Prime Numbers. |
|
Trapdoor
|
Information put in cyphertext using public key that is used by private key to decrypt
|
|
El Gamal
|
Asymmetric - slowest
Based on Diffie-Hellman Used for digital signatures, encryption and key exchange |
|
ECC
|
Asymmetric
Elliptic Curve Cryptosystems Provides digital signatures, key exchange, and encryption. ECC is more efficient using fewer resources Ideal for wireless and cell phone devices |
|
Knapsack
|
Asymmetric
Encryption only initially with digital signatures added later Insecure and no longer used |
|
Zero Knowledge Proof
|
Tell no more than is necessary.
|
|
MAC
|
Message Authentication Code
An authentication scheme which applies a secret key to a message. 3 basic types: Hash MAC (HMAC), CBC-MAC, CMAC |
|
HMAC
|
Hash MAC
Integrity and Data Origin Authentication No confidentiality Symmetric key is added to message and hashed resulting in MAC appended to message. Send to receiver, the message is used with receiver symmetric key and MACs should match. Confirms message was not altered and from which system it originated. |
|
CBC-MAC
|
Integrity and Data Origin Authentication
No confidentiality Does not do a one-way hash Encrypts message with shared symmetric key and send plaintext and only the final block of the ciphertext. Receiver uses key and plain text to match block of ciphertext. Form of Authentication. Date Origin Authentication or System Authentication. Weak because it is not bound to a user, only to devices. |
|
CMAC
|
Version of CBC-MAC but more secure and approved to with with 3DES and AES.
Integrity and Data Origin Authentication No confidentiality Uses symmetric key to create subkeys to encrypt the individual blocks. Outlined in 802.11i for block cipher AES |
|
Hash
|
Integrity
Not confidentiality or authentication Can detect only unintentional modifications |
|
Hash Value
|
Message Digest or Fingerprint
|
|
Hashing Algorthim
|
Nonkeyed Message Digest
|
|
MAC Synonym
|
Message Integrity Code (MIC) or Modification Detection Code (MDC)
|
|
MD2
|
One way hash
128 bit message digest Slowest MD |
|
MD4
|
One way hash
128 bit message digest high speed |
|
MD5
|
Similar to MD4 but more complex
|
|
HAVAL
|
Variable length hash value. Mod of MD5 with more protection again attacks against MD5.
|
|
SHA
|
Secure Hash Algorithm
160 bit hash value Used with DSA Updated versions have different lengths |
|
Tiger
|
192 bit hash
Not designed on MD4 thus no susceptible to MD4 style attacks |
|
Collision
|
Same value for 2 distinctly different messages that are hashed
|
|
Birthday Attack
|
Start with the original message and the hash value
The replacement message is changed until the hash value matches the original, also know as a collision |
|
Digital Signature
|
Integrity and Authentication and Nonrepudiation
Hash value encrypted with sender's private key Hashing provides Integrity Encrypting provides Authentication and Nonrepudation |
|
DSS
|
Digital Signature Standard
US standard outlining approved algorithms for digital signatures for government authentication activities |
|
Key Clustering
|
When using different keys on a plaintext message generates the same hash value.
|
|
One-time Pad (OTP)
|
If used correctly, impossible to crack
Key is same length as message Uses modular addition bit by bit |