Use LEFT and RIGHT arrow keys to navigate between flashcards;
Use UP and DOWN arrow keys to flip the card;
H to show hint;
A reads text to speech;
19 Cards in this Set
- Front
- Back
3 Core Cryptography Services |
Encryption Hashing Authentication |
|
CIA Triad |
Confidentiality Integrity Availability |
|
Two Open Source Encryption Products |
TrueCrypt PGP (Pretty Good Privacy) |
|
Cryptographic Protocol and one of the oldest Key exchanges in field of cryptography uses symetric key ciper |
Diffie-Hellman |
|
EDH |
Ephemeral Diffie-Hellman (or EDH) uses temporary public keys for symetric key ciperE |
|
ECDH |
Elliptical Curve Diffie-Hellman (or ECDH) is an anonymous key agreement protocol, which allows two parties to establish a secret over an insecure network. But each use has to have an elliptic curve, public-private key pair. |
|
Cryptography used with fiber optic networks |
Quantam Cryptography |
|
Substitution Cipher |
Example - In word "security," we may decide that every S will be equivalent to 3As and that an E would be equivalent to four Is. |
|
Transposition Cipher |
Transposition cipher takes the plaintext and shifts the characters or groups of characters according to a predefined regular system. So the ordering of the letters and numbers, for example, have been moved. |
|
Running Key Cipher |
Running key ciphers generally revolve around large chunks of written text such as a large word document, book, or article. The text is used to provide a very long key stream and then secretly referred to somewhere within the text documentation. |
|
Concealment Cipher |
Concealment cipher is a message within a message. For example, every tenth word in a PDF document may be part of a hidden message.
|
|
Block Cipher |
Block ciphers are simply fixed-length groups of bits that has a special meaning specified by a symmetric key. |
|
Stream Cipher |
Stream cipher occurs when each plain digit text is encrypted one at a time with the corresponding digit of the key stream. |
|
One Time Pad |
One-time pad is defined as each bit or character from the plaintext being encrypted by a modular addition with a bit or character from a secret random key, or pad of the same length as the plaintext, resulting in ciphertext. |
|
Cipher Modes of Operation |
Cipher modes of operation include cipher feedback, output feedback, electronic code book, and cipher block chaining. |
|
Cipher Feedback Mode |
Cipher feedback takes a block cipher and converts it into a stream cipher. |
|
Output Feedback Mode |
Output feedback has some similarities to cipher feedback. In that, it permits encryption of different block sizes. The key difference is that the output of the encryption block function is the feedback, instead of the ciphertext. |
|
ECB (Electronic Code Book) |
ECB is a mode of operation for a block cipher, the characteristic that each possible block of plaintext has a defined corresponding ciphertext value and vice versa. |
|
Cipher Block Chaining Mode |
In Cipher block chaining mode each block of plaintext is exclusive OR – you'll see that as XOR – with the previous ciphertext blocks before being encrypted. |