• Shuffle
    Toggle On
    Toggle Off
  • Alphabetize
    Toggle On
    Toggle Off
  • Front First
    Toggle On
    Toggle Off
  • Both Sides
    Toggle On
    Toggle Off
  • Read
    Toggle On
    Toggle Off
Reading...
Front

Card Range To Study

through

image

Play button

image

Play button

image

Progress

1/87

Click to flip

Use LEFT and RIGHT arrow keys to navigate between flashcards;

Use UP and DOWN arrow keys to flip the card;

H to show hint;

A reads text to speech;

87 Cards in this Set

  • Front
  • Back
The science that involves the use of codes and cyphers to obscure the meaning of a message.
Cryptology
The science of protecting data so that it may be stored and transmitted between parties while preserving confidentiality and/or integrity.
Cryptography
The science of breaking cryptographic algorithms to obtain the secret message without authorization.
Cryptanalysis
Sets of techniques that implement cryptography.
Cryptosystems
The mathematical function used to encrypt and decrypt messages.
Algorithm
The binary sequence used to provide secrecy to the algorithm.
Key
The original message in an unencrypted readable form.
Plaintext
The encrypted version of the message, unreadable without the correct algorithm and key.
Ciphertext
The practice of transforming plaintext into ciphertext with an algorithm and key.
Encryption
The practice of transforming ciphertext into plaintext with an algorithm and key.
Decryption
Symbols or words used to represent other words or phrases.
Codes
Mathematical functions to transform bits or characters into other bits or characters.
Ciphers
Two types of ciphers.
Block, stream
Ciphers that work on plaintext and ciphertext in chunks of a discrete size.
Block
Chipers that work on plaintext and ciphertext in a bitwise or characterwise fashion.
Stream
Random numbers used to introduce unpredictability into a cryptosystem.
Nonces
Logical function that is true only when both arguments are true.
AND
Logical function that is true when one or both of the arguments are true,
OR
Logical function that is true only when one or both elements are false.
NAND (not AND)
Logical function that is true only when both elements are false.
NOR (not OR)
Logical function that is true only when a single argument is false.
NOT
Logical function that is true only when one of the elements is true and the other is false.
XOR (exclusive OR)
Function that is equal to the remainder after performing integer division.
Modulo
A mathematical function that is easy to compute but practically impossible to compute the inverse operation.
One way function
A historical cipher that is generated by shifting each character three places to the right.
Caesar cipher
Ciphers that use multiple alphabets on a rotating basis.
Polyalphabetic substitution
Ciphers that move the letters of a message around in a manner that obscures their meaning.
Transformation
Ciphers that make use of a one time pad that uses a new key for each message, preventing most cryptanalysis techniques.
Vernam
Ciphers that use an extremely long key, usually drawn from a source such as a book.
Running
Two parties communicate with each other using the same secret key to encrypt and decrypt messages.
Secret key cryptography.
Once the only federally approved symmetric cryptosystem.
DES
Four modes of DES encryption.
ECB, CBC, CFB, OFB
DES modes that allow errors to propagate.
CBC, CFB
DES modes that do not allow errors to propagate.
ECB, OFB
Encryption that uses DES to encrypt the same message using two or three different keys.
Triple DES (3DES)
Key length of DES.
56 bits
Block size of DES
64 bit
Key length of 3DES.
168 bits
Four modes of 3DES.
DES-EEE3, DES-EDE3, DES-EEE2, DES-EDE2
3DES method using three different keys in encrypt mode.
DES-EEE3
3DES mode using three different keys, two in encrypt mode and one in decrypt mode.
DES-EDE3
3DES mode using two different keys to perform three encryption operations.
DES-EEE2
3DES mode using two different keys to perform two encryption operations and one decrypt operation.
DES-EDE2
Cipher used by AES.
Rijndael block cypher
AES key lengths.
128, 192, 256
AES block length.
128 bits
Effective block length of 3DES when using two keys.
112 bits
Effective block length of 3DES when using three keys.
168 bits
Symmetric algorithms.
DES, 3DES, CAST, SAFER, Skipjack, Blowfish, Twofish, RC*, IDEA
Blowfish key length.
32 to 448 bits
Twofish key length.
256 bits
Twofish block length
128 bits
RC5 key length.
up to 2048 bits
RC5 block length.
32, 64, or 128 bits
IDEA key length.
128 bits
IDEA block length.
64 bits
The use of image manipulation techniques to hide information in messages.
Steganography
Asymmetric algorithms.
RSA, El gamal, Merkle-hellman knapsack, Elliptic curve, diffie-hellman, LUC
Using asymmetric algorithms to certify the integrity of a message while in transit and ensure nonrepudiation.
Digital signature.
Hash that produces a 128 bit digest.
MD5
Hash that produces a 160 bit digest.
SHA-1
Hash that produces a 256 bit digest.
SHA-256
Hash that produces a 512 bit digest.
SHA-512
The most common form of encrypted email.
Secure multipurpose internet mail extensions (S/MIME)
Competitor for S/MIME that is not as commonly used.
MIME object security standard (MOSS)
Mail encryption that uses 3DES, RSA, MD5, and X.509.
Privacy enhanced mail (PEM)
Mail encryption that uses a web of trust to allow users to vouch for each others keys.
Pretty good privacy (PGP)
A standard proposed by netscape and commonly used to secure communications over the web and other internet protocols.
Secure sockets layer (SSL)
A standard proposed by credit card issuers but never became widely adopted.
Secure electronic transaction (SET)
A follow on protocol to SSL used to secure application level protocols.
Transport layer security (TLS)
Solves the problem of distributing authenticated public keys among users of asymmetric cryptosystems.
Public key infrastructure (PKI)
Certificates that PKI is based on.
X.509 v3
Guesses a cryptographic key by exhaustively checking all of the possibilities.
Brute force
Looks for weaknesses in the cryptopgraphic algorithm itself or in a particular software or hardware implementation.
Vulnerability exploit
Uses a mathematical analysis of a message to break the cryptosystem.
Statistical
Begins with an attacker having knowledge of a plaintext message and the corresponding ciphertext.
Known plaintext
Occurs when the attacker is able to determine the ciphertext that corresponds to a plaintext message of their choosing.
Chosen plaintext
Occurs when the attacker is able to determine the plaintext message that corresponds to a ciphertext of their choosing
Chosen ciphertext
Occurs when the attacker is able to find two plaintext messages that generate the same ciphertext,
Birthday attack
Occurs when an attacker has the plaintext and ciphertext and is able to use both simultaneously to determine the secret key
Meet in the middle attack
Occurs when the attacker is able to trick both communicating parties into thinking that they are communicating with each other when they are both actually communicating with the attacker who is relaying messages.
Man in the middle attack
Occurs when an attacker is able to obtain the ciphertext and later use it to impersonate the transmitter by simply using the same ciphertext even though they may not know the corresponding plaintext
Replay
Substitution cipher that uses a different alphabet for each letter of the plaintext message.
One time pad
Generates a unique message output value derived from the content of a message.
Message digest
A mechanism to prove knowledge of a fact to a third party without revealing the fact itself to that third party.
Zero knowledge proof
Protects entire communication circuits by creating a secure tunnel between two points.
Link encryption
Protections communications between two parties and is performed independently of link encryption.
End to end encryption