• Shuffle
    Toggle On
    Toggle Off
  • Alphabetize
    Toggle On
    Toggle Off
  • Front First
    Toggle On
    Toggle Off
  • Both Sides
    Toggle On
    Toggle Off
  • Read
    Toggle On
    Toggle Off
Reading...
Front

Card Range To Study

through

image

Play button

image

Play button

image

Progress

1/12

Click to flip

Use LEFT and RIGHT arrow keys to navigate between flashcards;

Use UP and DOWN arrow keys to flip the card;

H to show hint;

A reads text to speech;

12 Cards in this Set

  • Front
  • Back
Acronyms
in slides, on quizzes, in book; we need to know these things
True/False
qill be in quizzes, final exam
naming people
famous it security people
confidentiality / integrity / availability
need to know what type of violation is taking place in each situation
modes of operation in block ciphers
given one of diagrams; which mode was depicted? majority of points given for stepping through encryption and decryption with 3 small block, as well as error propagation
hash functions
what is a cryptographic hash function (3 properties + definitions)
hash and sign paradigm
taking hash and combining views of digital signatures with RSA; apply hash and sign paradigm to sign a message; sig = (h(m))^d mod n
implication of using h(x) = 2x+1 mod 33, h'(x) = (2x-2) mod 33
very simple to find collisions, making it not a cryptographic hash function
birthday paradox
connection to cryptographic hash functions
diiffe helmman key exhange protocol
know how to recognize it, what it is
main in the middle
recognize it, understand it, explain it; diffe-hellman is prone to MITM attacks
RSA
homomorphic; semantically secure; is semantically secure RSA with padding homormorphic or not (it is not; padding destroys multiplicative property)