Use LEFT and RIGHT arrow keys to navigate between flashcards;
Use UP and DOWN arrow keys to flip the card;
H to show hint;
A reads text to speech;
22 Cards in this Set
- Front
- Back
There are four modes of this DES algorithm:
|
Electronic code book, Output feedback, Cipher feedback and cipher block chaining.
|
|
__________ encrypts messages with DES in CBC mode, provides key distribution of DES keys by encrypting them with RSA, and signs messages with RSA over MD2 or MD5.
|
Privacy Enhanced Mail
|
|
A bit indicating whether the sum of a previous series of bits is even or odd.
|
Parity bits
|
|
A _________ for a recipient is a combination of encrypted content data (of any kind) and the content encryption key in an encrypted form that has been prepared for the use of the recipient
|
Digital envelope
|
|
A certificate document in the form of a digital data object (a data object used by a computer) to which is appended a computed digital signature value that depends on the data object Although the recommended definition can be interpreted to include those items, the security community does not use the term with those meanings.
|
Digital certificate
|
|
is a symmetric encryption algorithm. It is based on block cipher of a variable length. It encrypts the message through integer additions, the application of a bitwise Exclusive OR (XOR), and variable rotations.
|
RC5
|
|
The term "open message format" is used for the message's that are encrypted using the sender's _______ key. If the message had been encrypted with receiver's public key, than only the person whom it was addressed to can read it.
|
private
|
|
The _________ encryption strength is dependent on the complexity of using discrete logarithms in a finite field.
|
El Gamal
|
|
_________ is a public key alogrithm. The security of this algorithm comes from the difficulty of factoring large numbers.
|
Ron Rivest, Adi Shamir, and Leonard Adleman (RSA)
|
|
___________ provides digital signature, secure key distribution, and encryption. It is more efficient compared to RSA due the rich mathematical structures
|
Elliptic Curve Cryptosystems (ECC)
|
|
DES Modes
ECB (_____________) - ______ mode of DES - ______ Cipher - ______ secure of the modes -creates _____ |
DES Modes
ECB Electronic code book - native mode of DES - Block Cipher - Least secure of the modes - creates patterns |
|
DES Modes
CBC (______________) -_______ Cipher -______ bits plaintext blocks - key is ______ for each block, does not create patterns. |
DES Modes
CBC Cipher block chaining -Block Cipher -64 bits plaintext blocks - key is changed for each 64-bit block, does not create patterns. |
|
DES Modes
CFB (________) -______ cipher - Uses _____ cipher text to _____ key - An error will corrupt _____ message after the error. |
DES Modes
CFB (Cipher feedback mode) -Stream cipher - Uses previous cipher text to decrypt key - An error will corrupt entire message after the error. |
|
DES Modes
OFB (______) -______ cipher - ______ is used to generate the key - An error will corrupt ______ message. |
DES Modes
OFB (Output Feedback Mode) -Stream cipher - Feedback is used to generate the key - An error will corrupt part of the message. |
|
DES Modes
CTR (_______) -64 bit ______ number -____ counter for every block of text - Used by ____ and _____ |
DES Modes
CTR (Counter Mode) -64 bit random number -Different counter for every block of text - Used by ATM and IPSEC |
|
Meet in the middle attack is a specific attack on ___________
|
Meet in the middle attack is a specific attack on double DES
|
|
AES (______)
___ , ____, _____, bit key lengths Developed by ______ - _______ cipher |
AES (Advanced Encryption Standard)
128 , 192, 256, bit key lengths Developed by Rijndael - block cipher |
|
AES uses the following to calculate the algorithm:
- ______ - ______ - ______ - ______ |
AES uses the following to calculate the algorithm:
- Addroundkey (Xor) - S-boxes (subbytes) - Shiftrows - mixcolumns |
|
IDEA (________)
_____ bit blocks with _____ bit key ___ key length |
IDEA (International Data Encryption Algorithm)
64 bit blocks with 128 bit key fixed key length |
|
Safer (________)
works in ______ and _____ bit |
Safer (Secure and fast encryption routine)
works in 64 and 128 bit |
|
RC5
___, ____, ______ block sizes ___ to _____ key length |
RC5
32, 64, 128 block sizes 0 to 2048 key length |
|
Asymmetric Key Symmetric Key
_____ bits 64 bits _____ bits 112 bits _____ bits 128 bits |
Asymmetric Key Symmetric Key
512 bits 64 bits 1792 bits 112 bits 2304 bits 128 bits |