Use LEFT and RIGHT arrow keys to navigate between flashcards;
Use UP and DOWN arrow keys to flip the card;
H to show hint;
A reads text to speech;
33 Cards in this Set
- Front
- Back
- 3rd side (hint)
What are the essential ingredients of a symmetric cipher?
|
1) Plaintext
2) Encryption algorithm 3) Secret key 4) Cipher text 5) Decryption algorithm |
Ch 20 Review
|
|
What are the two basic functions used in encryption algorithms?
|
Substitution and Transposition (rearranging)
|
Ch 20 Review
|
|
How many keys are required for two people to communicate via a symmetric cipher?
|
1 secret key
|
Ch 20 Review
|
|
What is the difference between a block cipher and stream cipher?
|
A block cipher process one block of elements at a time, creating one block of output for each block of input. A stream cipher processes input elements continuously, producing output one element at a time.
*Block ciphers can reuse keys but Stream ciphers cannot, and Stream has variable key lengths |
Ch 20 Review
|
|
What are the two general approaches to attacking a cipher?
|
Brute-force approach (requires trying half of all possible keys to achieve success) or Cryptanalysis
|
Ch 20 Review
|
|
Computationally Secure means:
|
1) the cost of breaking the cipher exceeds the value of the encrypted information
2) the time required to break the cipher exceeds the useful lifetime of the information |
Ch 20 Def
|
|
What is the significance of the Feistel Cipher structure?
|
Many symmetric block encryption algorithms have a structure like the Feistel Cipher structure, including DES
|
Ch 20 Objs
|
|
Describe the structure and function of DES.
|
(NIST FIPS PUB 46)
Plaintext: 64 bit blocks, Key: 56 bits, Rounds: 16, Subkeys Generated from Key: 16 (one for each round) |
Ch 20 Objs
|
|
What is triple encryption?
|
Using 3 keys and 3 executions of the DES algorithm
|
Ch 20 Review
|
|
Why is the middle portion of 3DES a decryption rather than encryption?
|
No significance but allows decryption of older data using single DES
|
Ch 20 Review
|
|
Distinguish between 2-key and 3-key Triple DES.
|
3DES with 3 keys has an effective key length of 168 bits
with 2 keys (k1=k3): key length is 112 bits |
Ch 20 Objs
|
|
Describe the structure and function of AES.
|
Structure - Block length: 128 bits, Key length: 128, 192, or 256 bits (is NOT a Feistel Structure)
4 stages (1 of permutation, 3 of sub) Decryption is not identical to encryption algorithm |
Ch 20 Objs
|
|
What is RC4 used in?
|
SSL/TLS, WEP (not secure), WPA
|
Ch 20 Extra
|
|
What is the difference between link and end-to-end encryption?
|
Link:encrypted/decrypted between each frame switch on both ends of all communication lines, to read header and route (only vulnerable while in memory of Frame Switch)
End-to-end: encryption/decryption at end systems, user data fully protected but must do Link e/d on header for routing purposes COMBINED FOR BEST SECURITY |
Ch 20 Review
|
|
Discuss the issues involved in key distribution.
|
Making sure parties A and B receive the correct key, without being intercepted
|
Ch 20 Objs
|
|
What is the difference between a session key and a master key?
|
Session Key: for the duration of logical connection between 2 hosts, all user data is encrypted with a one-time key (then is destroyed)
Permanent Key: used between entities in order to distribute session keys |
Ch 20 Review
|
|
What is a key distribution center?
|
Determines what systems are allowed to communicate with each other. When permission is granted, a one-time session key is issued for that connection
|
Ch 20 Review
|
|
In the context of a hash function, what is a compression function?
|
see p665
equivalent to hash function applied to a message of single b-bit blocks |
Ch 21 Review
|
|
What basic arithmetical and logical functions are used in SHA?
|
SHA-1 Digest Size: 160 bits
SHA-2 Digest Size: 256, 384, 512 bits |
Ch 21 Review
|
|
nslookup: How could someone use Nslookup in an unethical manner?
|
to find the ip address of an organization's server and overload it with requests to result in a possible denial of service attack
|
Thought Questions - Lab Ch 1 DOS Commands
|
|
nslookup: How do domain names and IP addresses get registered?
|
through a Registrar. The DNS (Domain Name Service) is what associates an IP address with a domain name.
|
Thought Questions - Lab Ch 1 DOS Commands
|
|
dir & cd: Can you use the DIR command to show only directories? Executables? How?
|
Executables:
DIR *.EXE |
Thought Questions - Lab Ch 1 DOS Commands
|
|
dir & cd: Can you edit text files from the DOS prompt? How?
|
EDIT <TEXTFILE.TXT>
|
Thought Questions - Lab Ch 1 DOS Commands
|
|
dir & cd: Can you start programs from the command prompt?
|
START PROGRAM.EXE
|
Thought Questions - Lab Ch 1 DOS Commands
|
|
dir & cd: Can you change the color of the text and background in the command prompt? How?
|
COLOR [BACKGROUNDCOLOR][TEXTCOLOR]
for colors (0-F) |
Thought Questions - Lab Ch 1 DOS Commands
|
|
HashCalc: Is it possible to get the exact same hash out of different files?
|
Yes, this is called a collision
|
Thought Questions - Lab Ch 11 File Integrity Checkers and System Monitors
|
|
HashCalc: Is hashing the same thing as encrypting?
|
No, hashing is to provide integrity, while encryption is used for confidentiality
|
Thought Questions - Lab Ch 11 File Integrity Checkers and System Monitors
|
|
HashCalc: Can you de-hash?
|
No, hashing is just a way to provide a unique value for a file, to verify that nothing has been changed unexpectedly
|
Thought Questions - Lab Ch 11 File Integrity Checkers and System Monitors
|
|
Process Monitor: Why are there so many entries for the registry? What is the registry?
|
The registry is a database in Windows that contains important information about system hardware, installed programs and settings, and profiles of each of the user accounts on your computer. Windows continually refers to the information in the registry.
You should not need to make manual changes to the registry because programs and applications typically make all the necessary changes automatically. An incorrect change to your computer's registry could render your computer inoperable. However, if a corrupt file appears in the registry, you might be required to make changes |
Thought Questions - Lab Ch 11 File Integrity Checkers and System Monitors
|
|
Process Monitor: What is the difference between a process and a thread?
|
A process is a collection of virtual memory space, code, data, and system resources. A thread is code that is to be serially executed within a process. A processor executes threads, not processes, so each application has at least one process, and a process always has at least one thread of execution, known as the primary thread. A process can have multiple threads in addition to the primary thread. Prior to the introduction of multiple threads of execution, applications were all designed to run on a single thread of execution.
|
Thought Questions - Lab Ch 11 File Integrity Checkers and System Monitors
|
|
File Verifier++: Can you calculate a hash for a single file?
|
Yes
|
Thought Questions - Lab Ch 11 File Integrity Checkers and System Monitors
|
|
File Verifier++: From the hash, could you tell what was changed in the file?
|
No, it will just show a different hash sequence, unique from the original file's hash
|
Thought Questions - Lab Ch 11 File Integrity Checkers and System Monitors
|
|
File Verifier++: Should you use the longest hash possible? How long is good enough?
|
Hash length is important (hence the outdating of SHA-1 for SHA-2).. However, you should only use the necessary length due to time/computing power of longer hashes. SHA-2 includes SHA-224, -256, -386, and -512
|
Thought Questions - Lab Ch 11 File Integrity Checkers and System Monitors
|