Use LEFT and RIGHT arrow keys to navigate between flashcards;
Use UP and DOWN arrow keys to flip the card;
H to show hint;
A reads text to speech;
53 Cards in this Set
- Front
- Back
What are the three core services offered by Cryptography? |
|
|
Name two common cipher types? |
|
|
Hashing is used to maintain what? |
the integrity of information |
|
Non-repudiation is the term used for? |
ensuring that senders cannot say they did not send a message |
|
Encryption involves both _____________ and ____________ |
Algorithms and keys |
|
How is the algorithm and key used in encryption. |
|
|
The cryptography term Key Space means? |
How many bits are the encryption key. |
|
The cryptography term Work Factor means? |
Refers to a value indication the time it would take to break the encryption. The higher the value the more time it will take. |
|
The cryptography term One-Time Pads means?
|
An encryption method that involves using a key only once. |
|
The cryptography term Block Ciphers vs. Stream Cipher mean? |
Stream encrypts data one bit at a time while a Block encrypts one block at a time. |
|
Block Ciphers vs. Stream Cipher what are the advantage of Stream over Block? |
Stream ciphers are less overhead, faster and less error prone a error in block ciphering renders the entire block useless. |
|
Stream Cipher vs. Block Ciphers what are the advantage of Block over Stream? |
Block ciphers are more secure |
|
The cryptography term Padding refers to? |
Adding zeros or ones to the end of a message to create an even number of blocks. |
|
The cryptography term XOR means? |
Means if one and only one the value is 1 |
|
What is Symmetric encryption? |
The method uses the same key to encrypt and decrypt the message. |
|
What type of encryption is used on wireless networks? |
Symmetric encryption |
|
Name four other names for Symmetric encryption?
|
|
|
What is the advantage and disadvantages of Symmetric Encryption? |
Much faster than Asymmetric Encryption, the disadvantages are passing the encryption key and the number of key required to ensure confidentiality among all persons. |
|
How is the number of keys needed to encryption messages computed. |
Number of people X (Number of People -1)/2 |
|
What is Data Encryption Standard (DES)? |
It is a deprecated 56-bit block Cipher that used to be the government standard, but it is no longer considered secure. |
|
Name four Data Encryption Standard (DES) based block ciphers used today? |
|
|
Rivest Cipher (RC4/RC5) are streaming block ciphers that use the RC algorithm. What are they used for? |
RC4/RC5 are stream cipher used in SSL and WEP (for wireless security) |
|
The Advanced Encryption Standard (AES) is a symmetric block cipher? |
AES replaced DES as the new standard for symmetric encryption. It supports 128-bit, 192-bit, and AES256 256-bit encryption. |
|
The Asymmetric encryption involves using two mathematically related keys to perform the ____________ and ______________ process |
Encryption and Decryption |
|
The two main concepts about Asymmetric encryption? |
|
|
Public and Private Keys are associated with which type of encryption? |
Asymmetric encryption |
|
How are the public and private keys use for encryption and decryption in Asymmetric encryption? |
The private key is used for decryption and the recipient's public key is used to encryption . |
|
Where do public key reside? |
Generally on a central server, but the idea is that whomever communicates with sender should have access to their public key. |
|
In order to ensure non-repudiation messages are _____________? |
Signed using the senders private key. |
|
What is the advantage and disadvantages of asymmetric Encryption?
|
The public keys can securely be communicated to other parties unlike with symmetric encryption. Key management is a key benefit. Only one pair of keys per user is needed for encryption. A major disadvantage is speed. |
|
Name three Asymmetric Encryption Algorithms? |
|
|
Quantum cryptography is used with fiber-optic networks. How does it work? |
Works by sending encrypted information as photons (particles of light) which is converted to binary data. |
|
What is the benefit of Quantum cryptography? |
|
|
What is the difference between in-band key exchange and out-of-band key exchange. |
In the in-band key exchange the exchange is part of the communication. In out-band a separate channel is used to exchange keys. |
|
What is another name for hash value? |
Message Digest |
|
For the following four hashing algorithms what is the bit value of the generated hash:
|
|
|
For the following four hashing algorithms do not generate hash values what do they use:
|
|
|
What is Trusted Platform Module (TPM) |
A computer chip on a system that is used to store the cryptographic keys used for encryption. BIOS must support TPM |
|
The secure replacements for:
|
|
|
The following secure protocols are used for encrypting:
|
|
|
Internet Protocol Security (IPSec) has two modes, what are they? |
|
|
Name three new security concepts for protecting keys? |
|
|
PBKDF2 and Bcrypt are examples of what kind of key protection. |
Key stretching |
|
What is a Cipher suite? |
Cipher suite is a group of security algorithms used to provide authentication, encryption, and message authentication code functionally. Cipher suits are used to negotiate security settings in SSL and TLS. |
|
What are the two key negotiation protocols used by TLS? |
Diffie-Hellman Ephemeral (DHE) and Elliptic Curve Diffie-Hellman Ephemeral (ECDHE). |
|
Ephemeral key is key that? |
Uses a temporary key to encrypt a single message instead of the same key for all messages. |
|
Perfect forward secrecy is when? |
A system that generates random public keys (ephemeral key) for each session so that secret key exchange can occur during the communication. |
|
Key stretching uses a? |
Special algorithm to convert weak passwords into a stronger key. |
|
A Vigenere Cipher use a? |
Table to encrypt the message base on a intersection in the table. |
|
Key Space refers to what? |
How many bits are in the encryption key. The larger the key the more secure the key. |
|
Work Factor refers to what? |
A value indicating the time it would take to break the encryption. |
|
One-Time Pads refers to what? |
A very secure method of encryption information that involves using a key only once. |
|
Block Cipher vs. Stream Ciphers differences? |
Stream Cipher encrypt data one bit at a time, faster than block cipher, text is same size and part of the text can be invalid without invalidating all of it. Block Cipher more secure, uses XOR , encrypt blocks |