• Shuffle
    Toggle On
    Toggle Off
  • Alphabetize
    Toggle On
    Toggle Off
  • Front First
    Toggle On
    Toggle Off
  • Both Sides
    Toggle On
    Toggle Off
  • Read
    Toggle On
    Toggle Off
Reading...
Front

Card Range To Study

through

image

Play button

image

Play button

image

Progress

1/33

Click to flip

Use LEFT and RIGHT arrow keys to navigate between flashcards;

Use UP and DOWN arrow keys to flip the card;

H to show hint;

A reads text to speech;

33 Cards in this Set

  • Front
  • Back
  • 3rd side (hint)
What are the essential ingredients of a symmetric cipher?
1) Plaintext
2) Encryption algorithm
3) Secret key
4) Cipher text
5) Decryption algorithm
Ch 20 Review
What are the two basic functions used in encryption algorithms?
Substitution and Transposition (rearranging)
Ch 20 Review
How many keys are required for two people to communicate via a symmetric cipher?
1 secret key
Ch 20 Review
What is the difference between a block cipher and stream cipher?
A block cipher process one block of elements at a time, creating one block of output for each block of input. A stream cipher processes input elements continuously, producing output one element at a time.
*Block ciphers can reuse keys but Stream ciphers cannot, and Stream has variable key lengths
Ch 20 Review
What are the two general approaches to attacking a cipher?
Brute-force approach (requires trying half of all possible keys to achieve success) or Cryptanalysis
Ch 20 Review
Computationally Secure means:
1) the cost of breaking the cipher exceeds the value of the encrypted information
2) the time required to break the cipher exceeds the useful lifetime of the information
Ch 20 Def
What is the significance of the Feistel Cipher structure?
Many symmetric block encryption algorithms have a structure like the Feistel Cipher structure, including DES
Ch 20 Objs
Describe the structure and function of DES.
(NIST FIPS PUB 46)
Plaintext: 64 bit blocks, Key: 56 bits, Rounds: 16, Subkeys Generated from Key: 16 (one for each round)
Ch 20 Objs
What is triple encryption?
Using 3 keys and 3 executions of the DES algorithm
Ch 20 Review
Why is the middle portion of 3DES a decryption rather than encryption?
No significance but allows decryption of older data using single DES
Ch 20 Review
Distinguish between 2-key and 3-key Triple DES.
3DES with 3 keys has an effective key length of 168 bits
with 2 keys (k1=k3): key length is 112 bits
Ch 20 Objs
Describe the structure and function of AES.
Structure - Block length: 128 bits, Key length: 128, 192, or 256 bits (is NOT a Feistel Structure)
4 stages (1 of permutation, 3 of sub)
Decryption is not identical to encryption algorithm
Ch 20 Objs
What is RC4 used in?
SSL/TLS, WEP (not secure), WPA
Ch 20 Extra
What is the difference between link and end-to-end encryption?
Link:encrypted/decrypted between each frame switch on both ends of all communication lines, to read header and route (only vulnerable while in memory of Frame Switch)
End-to-end: encryption/decryption at end systems, user data fully protected but must do Link e/d on header for routing purposes
COMBINED FOR BEST SECURITY
Ch 20 Review
Discuss the issues involved in key distribution.
Making sure parties A and B receive the correct key, without being intercepted
Ch 20 Objs
What is the difference between a session key and a master key?
Session Key: for the duration of logical connection between 2 hosts, all user data is encrypted with a one-time key (then is destroyed)
Permanent Key: used between entities in order to distribute session keys
Ch 20 Review
What is a key distribution center?
Determines what systems are allowed to communicate with each other. When permission is granted, a one-time session key is issued for that connection
Ch 20 Review
In the context of a hash function, what is a compression function?
see p665
equivalent to hash function applied to a message of single b-bit blocks
Ch 21 Review
What basic arithmetical and logical functions are used in SHA?
SHA-1 Digest Size: 160 bits
SHA-2 Digest Size: 256, 384, 512 bits
Ch 21 Review
nslookup: How could someone use Nslookup in an unethical manner?
to find the ip address of an organization's server and overload it with requests to result in a possible denial of service attack
Thought Questions - Lab Ch 1 DOS Commands
nslookup: How do domain names and IP addresses get registered?
through a Registrar. The DNS (Domain Name Service) is what associates an IP address with a domain name.
Thought Questions - Lab Ch 1 DOS Commands
dir & cd: Can you use the DIR command to show only directories? Executables? How?
Executables:
DIR *.EXE
Thought Questions - Lab Ch 1 DOS Commands
dir & cd: Can you edit text files from the DOS prompt? How?
EDIT <TEXTFILE.TXT>
Thought Questions - Lab Ch 1 DOS Commands
dir & cd: Can you start programs from the command prompt?
START PROGRAM.EXE
Thought Questions - Lab Ch 1 DOS Commands
dir & cd: Can you change the color of the text and background in the command prompt? How?
COLOR [BACKGROUNDCOLOR][TEXTCOLOR]
for colors (0-F)
Thought Questions - Lab Ch 1 DOS Commands
HashCalc: Is it possible to get the exact same hash out of different files?
Yes, this is called a collision
Thought Questions - Lab Ch 11 File Integrity Checkers and System Monitors
HashCalc: Is hashing the same thing as encrypting?
No, hashing is to provide integrity, while encryption is used for confidentiality
Thought Questions - Lab Ch 11 File Integrity Checkers and System Monitors
HashCalc: Can you de-hash?
No, hashing is just a way to provide a unique value for a file, to verify that nothing has been changed unexpectedly
Thought Questions - Lab Ch 11 File Integrity Checkers and System Monitors
Process Monitor: Why are there so many entries for the registry? What is the registry?
The registry is a database in Windows that contains important information about system hardware, installed programs and settings, and profiles of each of the user accounts on your computer. Windows continually refers to the information in the registry.

You should not need to make manual changes to the registry because programs and applications typically make all the necessary changes automatically. An incorrect change to your computer's registry could render your computer inoperable. However, if a corrupt file appears in the registry, you might be required to make changes
Thought Questions - Lab Ch 11 File Integrity Checkers and System Monitors
Process Monitor: What is the difference between a process and a thread?
A process is a collection of virtual memory space, code, data, and system resources. A thread is code that is to be serially executed within a process. A processor executes threads, not processes, so each application has at least one process, and a process always has at least one thread of execution, known as the primary thread. A process can have multiple threads in addition to the primary thread. Prior to the introduction of multiple threads of execution, applications were all designed to run on a single thread of execution.
Thought Questions - Lab Ch 11 File Integrity Checkers and System Monitors
File Verifier++: Can you calculate a hash for a single file?
Yes
Thought Questions - Lab Ch 11 File Integrity Checkers and System Monitors
File Verifier++: From the hash, could you tell what was changed in the file?
No, it will just show a different hash sequence, unique from the original file's hash
Thought Questions - Lab Ch 11 File Integrity Checkers and System Monitors
File Verifier++: Should you use the longest hash possible? How long is good enough?
Hash length is important (hence the outdating of SHA-1 for SHA-2).. However, you should only use the necessary length due to time/computing power of longer hashes. SHA-2 includes SHA-224, -256, -386, and -512
Thought Questions - Lab Ch 11 File Integrity Checkers and System Monitors