• Shuffle
    Toggle On
    Toggle Off
  • Alphabetize
    Toggle On
    Toggle Off
  • Front First
    Toggle On
    Toggle Off
  • Both Sides
    Toggle On
    Toggle Off
  • Read
    Toggle On
    Toggle Off
Reading...
Front

Card Range To Study

through

image

Play button

image

Play button

image

Progress

1/45

Click to flip

Use LEFT and RIGHT arrow keys to navigate between flashcards;

Use UP and DOWN arrow keys to flip the card;

H to show hint;

A reads text to speech;

45 Cards in this Set

  • Front
  • Back
Cryptography Notation
name-w/r/b
example:
RC5-32/12/16

w=Word Size (bits), r=Rounds, b=Bytes (x4=bits)
DES - Name
Data Encryption Standard
DES - Algorithm
DEA - Data Encryption Algorithm (altered form of Lucifer)
Symmetric
64/16/56
Lucifer
Chosen for DES and renamed DEA
DES - Modes
ECB - Code Book, No Chaining
CBC - Block Chaining
CFB - Cipher Feedback
OFB - Output Feedback
CTR - Counter
3DES - Name
Triple Data Encryption Algorithm
3DES - Algorithm
Triple DEA
Symmetric
64/48/56
3DES - Modes
EEE3
EDE3
EEE2
EDE2
E = Encryption, D = Decryption
Decryption during Encryption uses a different key
3DES - Why was it developed
Quick fix of DES before AES was ready
AES - Name
Advanced Encryption Standard
AES - Algorithm
Rijndael
Symmetric
128/10/32
192/12/48
256/14/64
IDEA - Name
International Data Encryption Algorithm

Patented

Used by PGP
IDEA - Algorithm
Symmetric
64bit / 16
128 key
Blowfish
Symmetric
64/16/32-448 bit

Public Domain
RC4
Symmetric
Stream
Improperly used in Wireless and will be replaced with 802.11i
Proprietary but source published under name ARC4
RC5
Symmetric
Block
32,64,128/1-255/1-2048
RC6
Symmetric
Block
Improved upon RC5 - speed increase
32,64,128/1-255/1-2048
Symmetric Strengths / Asymmetric Strengths
Symmetric:
Much Faster
With large keys, hard to break
Provides Confidentiality (but not authenticity and non-repudiation)

Asymmetric:
Key Management (Allows Public Key use)
- Distribution and Scaling
Can provide Authentication and Non-repudiation
Diffie-Heliman Algorithm
Asymmetric - The first agreement algorithm
Used to create a Symmetric key on both sides using local private and remove public
RSA
Defacto standard for digital signatures, key exchange, and encryption.

Uses large numbers factoring into their Prime Numbers.
Trapdoor
Information put in cyphertext using public key that is used by private key to decrypt
El Gamal
Asymmetric - slowest
Based on Diffie-Hellman
Used for digital signatures, encryption and key exchange
ECC
Asymmetric
Elliptic Curve Cryptosystems
Provides digital signatures, key exchange, and encryption.
ECC is more efficient using fewer resources
Ideal for wireless and cell phone devices
Knapsack
Asymmetric
Encryption only initially with digital signatures added later
Insecure and no longer used
Zero Knowledge Proof
Tell no more than is necessary.
MAC
Message Authentication Code
An authentication scheme which applies a secret key to a message.

3 basic types: Hash MAC (HMAC), CBC-MAC, CMAC
HMAC
Hash MAC
Integrity and Data Origin Authentication
No confidentiality

Symmetric key is added to message and hashed resulting in MAC appended to message.

Send to receiver, the message is used with receiver symmetric key and MACs should match. Confirms message was not altered and from which system it originated.
CBC-MAC
Integrity and Data Origin Authentication
No confidentiality

Does not do a one-way hash
Encrypts message with shared symmetric key and send plaintext and only the final block of the ciphertext.
Receiver uses key and plain text to match block of ciphertext.

Form of Authentication. Date Origin Authentication or System Authentication.

Weak because it is not bound to a user, only to devices.
CMAC
Version of CBC-MAC but more secure and approved to with with 3DES and AES.

Integrity and Data Origin Authentication
No confidentiality

Uses symmetric key to create subkeys to encrypt the individual blocks.

Outlined in 802.11i for block cipher AES
Hash
Integrity

Not confidentiality or authentication

Can detect only unintentional modifications
Hash Value
Message Digest or Fingerprint
Hashing Algorthim
Nonkeyed Message Digest
MAC Synonym
Message Integrity Code (MIC) or Modification Detection Code (MDC)
MD2
One way hash
128 bit message digest
Slowest MD
MD4
One way hash
128 bit message digest
high speed
MD5
Similar to MD4 but more complex
HAVAL
Variable length hash value. Mod of MD5 with more protection again attacks against MD5.
SHA
Secure Hash Algorithm
160 bit hash value
Used with DSA

Updated versions have different lengths
Tiger
192 bit hash

Not designed on MD4 thus no susceptible to MD4 style attacks
Collision
Same value for 2 distinctly different messages that are hashed
Birthday Attack
Start with the original message and the hash value

The replacement message is changed until the hash value matches the original, also know as a collision
Digital Signature
Integrity and Authentication and Nonrepudiation

Hash value encrypted with sender's private key

Hashing provides Integrity
Encrypting provides Authentication and Nonrepudation
DSS
Digital Signature Standard

US standard outlining approved algorithms for digital signatures for government authentication activities
Key Clustering
When using different keys on a plaintext message generates the same hash value.
One-time Pad (OTP)
If used correctly, impossible to crack

Key is same length as message

Uses modular addition bit by bit