• Shuffle
    Toggle On
    Toggle Off
  • Alphabetize
    Toggle On
    Toggle Off
  • Front First
    Toggle On
    Toggle Off
  • Both Sides
    Toggle On
    Toggle Off
  • Read
    Toggle On
    Toggle Off
Reading...
Front

Card Range To Study

through

image

Play button

image

Play button

image

Progress

1/68

Click to flip

Use LEFT and RIGHT arrow keys to navigate between flashcards;

Use UP and DOWN arrow keys to flip the card;

H to show hint;

A reads text to speech;

68 Cards in this Set

  • Front
  • Back

What is cryptography?

Cryptography is the science of hiding information in plain sight, in order to conceal it from unauthorized parties.

What cipher did Ceasar use for battlefield communications?

Substitution cipher.

What was the first cipher used and by whom?

Substitution cipher first used by Ceasar for battlefield communications.

What is plaintext?

An original message.

What is ciphertext?

An encrypted message.

What is encryption?

The process of transforming plaintext into ciphertext (also encipher).

What is decryption?

The process of transforming ciphertext into plaintext (also decipher).

What is an encryption key?

The text value required to encrypt and decrypt data.

What are the 6 methods of encryption?

  1. Substitution
  2. Transportation
  3. Monoalphabetic
  4. Polyalphabetic
  5. Running-key
  6. One time pads

What are the 2 types of encryption?

  1. Block cipher
  2. Stream cipher

What are the 3 types of encryption keys?

  1. Symmetric key
  2. Asymmetric key
  3. One-time pad

What is a symmetric key?

A common secret that all parties who participate must know.

What is an asymmetric key?

  • Public / private key
  • Openly distribute public key to all parties.

What is a one-time pad?

Used once, is as large as the message to be encrypted.

What was Ceasar's version of the substitution cipher?

Ceasar rotated three to the right.



A > D, B > E, C > F, etc

What is the substitution cipher?

Plaintext characters are substituted to form ciphertext.



  • A table or formula is used.

What is the transposition cipher?

  • Plaintext messages are transposed into ciphertext.
  • Write into column going down, read from columns to the right.

What is the vulnerability of the transposition cipher?

Subject to frequency analysis attack.

What is a monoalphabetic cipher?

One alphabetic character is substituted for another.

What is the vulnerability of the monoalphabetic cipher?

Subject to frequency analysis attack.

What is a polyalphabetic cipher?

Two or more substitution alphabets.

What is the advantage of a polyalphabetic cipher?

Not subject to frequency attack.

What is a running-key cipher?

  • Plaintext letters converted to numeric (A=0, B=1, etc)
  • Plaintext values "added" to key values giving ciphertext.
  • Modulo arithmetic is used to keep results in range 0-26.

What is Modulo arithmetic?

Add 26 if result <0, subtract 26 if result >26.

What is a one-time pad?

  • Works like running key cipher, except that key is length of plaintext, and is used only once.
  • Highly resistant to cryptanalysis.

What is a block cipher?

Encrypt and decrypt a block of data at a time (typically 128 bits).

What is the typical length of a block cipher?

128 bits.

What are the typical uses for a block cipher? (4)

  • Files
  • E-mail messages
  • Text communications
  • Web

What are the well known encryption algorithms for block ciphers? (7)

  1. DES
  2. 3DES
  3. AES
  4. CAST
  5. Twofish
  6. Blowfish
  7. Serpent

For block cipher, what is Electronic Code Book?

  • Simplest block cipher mode
  • Each block encrypted separately.

For block cipher, what is Cipher-block Chaining (CBC)?

  • Ciphertext output from each encrypted plaintext block in encryption used for next block.
  • First block encrypted with IV.

What does IV stand for?

Initialization vector.

For block cipher, what is Cipher Feedback (CFB)?

  • Plaintext for block N is XOR'd with the ciphertext from block N-1.
  • In the first block, the plaintext XOR'd with the encrypted IV.

What does CBC stand for?

Cipher-block Chaining (CBC)

What does CFB stand for?

Cipher Feedback

What does OFB stand for?

Output Feedback.

For block cipher, what is Output Feedback?

Plaintext is XOR'd with the encrypted material in the previous block to produce ciphertext.

For block cipher, what is Counter?

Uses a "nonce" (a random number that is used once) that is concatenated with a counter or other simple function, which is encrypted by the block cipher, and the output XOR'd with the plaintext block to produce the ciphertext block.

What does CTR stand for?

Counter.

What are stream ciphers used for?

Used to encrypt a continuous stream of data, such as an audio or video transmission.

What is a stream cipher?

A stream cipher is a substitution cipher that typically uses an exclusive -or (XOR) operation that can be performed very quickly by a computer.

Plaintext 1 1 0 1 0


Key 0 1 1 0 0

Ciphertext 1 0 1 1 0

What is a symmetric key?

Same key used at both ends of a communications channel or session



A symmetric key is also known as a shared secret

List 7 encryption algorithms that use symmetric keys.

  1. DES
  2. 3DES
  3. AES
  4. Twofish
  5. Blowfish
  6. IDEA
  7. RC5

What are asymmetric keys?

  • Overcomes the problem of communicating a shared secret to another party


  • Key distribution scales better that symmetric cryptography.
  • All parties can share each others' public keys.

What encryption algorithms use asymmetric keys?

  1. RSA
  2. EI Gamal
  3. Elliptic Curve

List 2 hardening techniques.

1. Separation of duties



2. Split custody.

List 8 cryptanalysis attacks.

  1. Frequency analysis
  2. Brithday attacks
  3. Ciphertext only attack
  4. Chosen plaintext attack
  5. Chosen ciphertext attack
  6. Known plaintext attack
  7. Man in the middle attack
  8. Replay attack

What are the uses for cryptography? (5)

  1. File encryption
  2. Encrypted volumes and disks
  3. E-mail
  4. Web browsing - protects session contents from eavesdropping
  5. Protecting network communications

What type of encryption does WinZip version 9 use?

AES.

What does EFS stand for?

Encrypting File System.

What are the two common ways email is encrypted?

  1. PGP / GPG
  2. S/MIME

What does S/MIME stand for?

Secure / Multipurpose Internet Mail Extensions

What does PEM stand for?

Privacy Enhanced Mail

What does SSL/TLS stand for?

Secure Sockets Layer / Transport Layer Security

What is IPsec?

Encrypts all packets between established pairs of hosts.

What is key escrow?

Keys held by a trusted third party.

What is a message digest?

The result of a cryptographic operation on a file or message.


  • Fixed-length result regardless of message size.
  • Impossible to derive original message from digest.

What algorithms are used to create a message digest? (3)

  1. MD-5
  2. SHA-1
  3. HMAC

What algorithms are used to create digital signatures? (3)

  1. DSA
  2. EI Gamal
  3. Elliptic Curve DSA

What is a digital signature?

  • Message digest that is cryptographically combined with signer's private key.
  • Requires public key cryptography.
  • Verifies message integrity.
  • Verifies identity of signer.

What is non-repudiation?

Inability for a user to repudiate (deny) an action, because of the methods used to permit or authorize the action.

What does PKI stand for?

Public Key Infrastructure

What are two PKI platforms?

  • LDAP
  • Microsoft Active Directory

What is steganography?

Data hidden in image files, subtle changes that the eye won't see; can be encrypted as well.

What is watermarking?

Like a digital signature - a visible or invisible mark that claims ownership.

What is cryptanalysis?

An attack on a cryptosystem.

What is a PKI?

is a network-based service used to store digital certificates or public encryption keys of individuals in a community.