• Shuffle
    Toggle On
    Toggle Off
  • Alphabetize
    Toggle On
    Toggle Off
  • Front First
    Toggle On
    Toggle Off
  • Both Sides
    Toggle On
    Toggle Off
  • Read
    Toggle On
    Toggle Off
Reading...
Front

Card Range To Study

through

image

Play button

image

Play button

image

Progress

1/50

Click to flip

Use LEFT and RIGHT arrow keys to navigate between flashcards;

Use UP and DOWN arrow keys to flip the card;

H to show hint;

A reads text to speech;

50 Cards in this Set

  • Front
  • Back
Describe two fish
symmetric block cipher that operates on 128 bit blocks in 16 rounds and can accept key lenghts of up to 256 bits
Describe the term pre-whitening and post-whitening
Twofish algorithm uses thes methods where additional subkeys are XORed with the plaintext before the first round and after the 16th round.
Describe the IDEA cipher
Operates on 64 bit plaintext blocks and uses a 128 bit key it applies both confusion and diffusion.
How many rounds does IDEA use
8 rounds
What is a common application of the IDEA cipher
PGP
Describe RC5
Block cipher of variable block size that encrypts through integer addition, the number of rounds is also variable
What is the key size range for RC5
0-2048
What is the number of rounds for RC5
0-255
Describe RSA
asymmetric based on the difficulty of factoring large prime numbers
Describe Diffie-Helman
a method where subjects exchange secret keys over a nonsecure medium without exposing the keys.
Describe El-Gammal
Asymmetric non patented publich key cryptosytem that is based on the discrete log problem
Describe Knapsack
based on the problem of having a sset of items with fixed weights and determing which of these items can be added in order to obtain a given total weight.
What is the DSS
Digital Signature Standard allows the use of RSA or DSA
Describe MD5
takes a message of arbitrary length and generates 128 bit message digest
What is HMAC
a hasing algorithm that uses a key to generate a MAC.
What is a MAC
message authentication code, a type of checksum that is a function of the information in the message.
What is included in a digital certificate?
subject's name, subject's public key, name of the CA and the period of validity
What types of attack are LDAP servers vulnerable to?
availability and integrity
What does Version 2 of the X.509 certificates address?
name reuse
What does Version 3 of the X.509 certificates address?
provides for certificate extensions to the core certificates fields
What does Version 4 of the X.509 certificates address?
provides additional extentions
What are four types of certificates issued?
CA certs, End entity certificates, self-issued certs, rollover certs
The Escrowed Encryption Standard is covered under which NIST publication
NIST FIPS PUB 185
What is Clipper Chip?
the governments key escrow standard that utilizes the skipjack secret key
What are two advantages of Identity Based Encryption?
the sender does not have to be online to obtain recipients certificate and mail can be sent to recipients who have not established a public key
In quantum computing a counterclockwise spin is used to represent what?
0
In quantum computing a clockwise spin is used to represent what?
1
What is an example of quantum computing used in cryptography?
Shor's algorithm
What is S/MIME?
Provides secure services to email in MIME format including: authentication through digital signatures, and the confidentiality of encryption
What is MIME Security Services Object
provides flexible security services by supporting different trust models in email
What is Secure Electronic Transaction or SET?
Developed by MasterCard and Visa to prevent fraud from occurring on financial transactions by encrypting the payment information
What makes us a a Security Association in IPSEC?
A Security Parameter Index, destination IP, and the identiy of the security protocol
What is a Security Parameter Index?
a 32 bit number that is used to distinguish among various SAs terminating at the receiving station
How many SAs are required for two way communication?
Two per protocol
What are the three components of SSH?
Transport Layer protocol, User Authentication Protocol, and a Connection protocol
What are the layers of the WAP
WML, WAE, WSP, WTP, WTLS, & WDP
How many classes of security does WTLS provide?
3
What phases does a basic machine cycle consist of?
fetch and execute
What is pipelining?
increasing the performance of a computer by overlapping the steps of different instructions
Which is less desirable a complied program or an interpreted program?
A compiled program because malicious code can be resident somewhere in the compiled code and could be difficult to detect
C based languages fall into what generation grouping of languages?
3rd GL
SQL falls into what generation grouping of languages?
4th GL
What is the purpose of establishing a protection domain?
to protect programs from all unauthorized modification or executional interference
What is a trusted computing base?
the total combination of protection mechanisms within a computer system
What is a reference monitor?
a system component that enforces access controls on an object
According to the Orange book a Class B system is what?
Mandatory protection
According to the Orange book a class A system is what?
Verified protection
What is the Systems Security Engineering Capability Maturity Model?
based on the premise that if you can guarantee the quality of the processes that are used by an organization then you can guarantee the quality of the products and service generated by those services
What is the Access Matrix model?
supports directory access control because the entries in the matrix are at the discretion of the individuals who have control over the table.
What are the columns in the Access Matrix model called?
ACLs