• Shuffle
    Toggle On
    Toggle Off
  • Alphabetize
    Toggle On
    Toggle Off
  • Front First
    Toggle On
    Toggle Off
  • Both Sides
    Toggle On
    Toggle Off
  • Read
    Toggle On
    Toggle Off
Reading...
Front

Card Range To Study

through

image

Play button

image

Play button

image

Progress

1/50

Click to flip

Use LEFT and RIGHT arrow keys to navigate between flashcards;

Use UP and DOWN arrow keys to flip the card;

H to show hint;

A reads text to speech;

50 Cards in this Set

  • Front
  • Back
Cryptanalysis
Breaking or cracking the code and deciphering the data without authorization
Cryptosystem
A system for encoding and deciphering data.
Decipher
To decode the data
Encipher
To code the data
Keyspace
The group of numbers used to create a key.
Non-repudiation
Ensuring that the message sender is tracked and stored as having sent the message.
Work Factor
Estimated amount of work it would take to break the code.
What are the 4 primary goals of cryptography?
Confidentiality, Integrity, Authentication, and non-repudiation.
Differential Cryptanalysis
Compares two plain text data sets suring encryption to determine probably keys. Often used against block ciphers.
Factoring
Attempting to determine the prime factors of the keys.
Linear Cryptanalysis
Compares known plain text and ciphertext to determine probably keys
Man-in-the-middle
Intercepting messages between the sender and receiver
Meet-in-the-middle
Compares known plaintext and keys to intercepted encrypted text.
Substitution
A method of encoding data that uses the alphabet and each letter's associated numbers. Predetermined pattern.
Ceaser Cipher
Common form of substitution. Moves each letter 3 places forward in relation to its number.
Polyalphabetic Cipher
Uses multiple alphabets to encode data. (i.e. vigenere cipher)
Transposition
A method of encoding data that scrambles the letters of the message. a/k/a - Permutation
Concealment Cipher
A predetermined key or groups of words used to decode a message, such as reading only every fourth word.
Running Key Cipher
Using some predetermined set of actions taken to decode a message.
Steganography
Photographs or other digitial media used to hide messages.
Symmetric Key Cryptography
A method of encoding data that uses a single key. Used by both sender and receiver. Good to use with large amounts of data and is faster than Asymmetric
Key Escrow
Form of symmetric key cryptography used by law enforcement. Third party agency maintains the key.
Clipper Chip
An encryption chip for digital voice communications that automatically encrypts and decrpyts.
Block Cipher
An encryption method that breaks the message into blocks of data bits. Each block is encoded.
Stream Cipher
An ecryption method that breaks the message into a stream of single bits. Each bit is encoded. Slow method
Data Encryption Standard (DES)
56 bit cipher key for symmetric key encryption. Remaining 8 bits are used for parity, performed through 16 rounds. Susceptible to brute force attacks
Triple DES (3DES)
Uses 112 bit cipher key for symmetric key encryption. Encrypts message 3 times.
Advanced Encrption Standard (AES)
Uses Rijndael Block Cipher. Incorporates variable block cipher and key lengths. Uses a key size of 128.192, or 256. Approved by government
Name the 4 modes of DES
1. Cipher Block Chaining(CBC) - Most common. XORs an initialization block.
2. Cipher feedback(CF) - uses stream cipher
3. Electronic Code Book(ECB) - Uses Block ciphering
4. Output Feedback(OF) - Easy to break, XORs plain text
Name the 3 modes of 3DES
1. DES-EDE2 - Encrypt with one key, decrypts with another, encrypts with the first key again.
2. DES-EEE2 - Encrypts with one key, encrypts with a 2nd key, encrypts with the first key
3. DES-EEE3 - Encrypts with one key, encrypts with a 2nd key, encrypts with a 3rd key.
Rijndael Block Ciper
Uses both variable block and key lengths determined by the implementation. The lengths can be either 128,192, or 256.
Blowfish
Block cipher with block lengths, encrypted thru 16 X of 64 bits and key lengths up to 448 bits.
International Data Encryption Algorithm (IDEA)
Block cipher with block lengths of 64 bits divided into 16 bit units and encrypted 8 X. key lengths of 128 bits
RC5
Block cipher with variable block and key lengths and as well as encryption iterations
RC6
Block cipher based on RC5. Uses a min. 128 block size and 2 working registers to comply with AES
Twofish
Block cipher with 128 bit block lengths, encrypted 16 X and key lengths up to 256 bits.
Asymmetric Key Cryptography
A method of encoding information that uses 2 keys and a one-way function. Public key encrypts, private key decrypts. can perform authenticatoin and non-repudiation. a/k/a public key cryptography
Open Message
Encrypts message with private key, provides authentication only.
Secure Message
Encrypts the message with public key, provides confidentiality only.
Signed and Secure Message
Encrypts the message with private key and then with public key, provides authentication and confidentiality
Message Digest(Message Hash)
Cryptographic data that verifies the contents of a message that has not been altered.
What is the difference between keyed and non-keyed message digests?
Keyed - original message combined with a secret key. (MACs)
Non-Keyed - original message hashed without any other mechanisms(MICs and MDCs)
Name some Message Digest Formats
Message Digest 5 (MD5)
Secure Hash Algorithm(SHA)
Hashed Message Authentication Code (HMAC)
Characteristics of a message hash
1. Set length signature is created from variable length input.
2. Slight change in orginal creates great difference in result signatures.
3. Chances of 2 differing input values produce the same output signatures are low.
Asymmetric key algorithms
1. Diffie-Helman - requires key agreement
2. El Gamal - Functions on the encryption and digital signature. Often operates slowly.
3. Elliptic Curve Cryptosystem(ECC) - Often difficult to implement but capable to functioning with limited resources such as power and bandwidth.
4. Merkle-Hellman Knapsack - Applying weights to each set of items where the total defines the items in the knapsack. Used w/ trapdoors to one-way functions.
5. RSA - Functions on the encryption, digital signature, and key exchange.
Public Key Infrastructure(PKI)
Keys are created on the PC. Designed to address remote users and their data transmissions. common for e-commerce.
Digital Signature
Validates identity of sender. approved by NIST via SHS
Name 4 Email Security Methods
1. Pretty Good Privacy(PGP) - uses PGP keys only
2. Privacy Enhanced Mail(PEM) - can use various keys
3. Multipurpose Internet Mail Extension(MIME) - good choice for internal and standalone. No inherent security measures
4. Secure/MIME(SMIME)
Name 5 Internet Security Methods
1. Internet Security Protocol(IPSec) - server to server, remote access, network protection.
2. Secure Electronic Transaction(SET) - transmitting credit card data
3. Secure Hypertext Transport Protocol(SHTTP) - Protects single pages
4. Secure Shell(SSH-2) - remote access over the network.
5. Secure Socket Layer(SSL) - client to server authentication (HTTPS)
2 Different protocols for IPSec
1. Authentication Header(AH) - provides authentication
2. Encapsulating Security Payload(ESP) - whole suite of security