• Shuffle
    Toggle On
    Toggle Off
  • Alphabetize
    Toggle On
    Toggle Off
  • Front First
    Toggle On
    Toggle Off
  • Both Sides
    Toggle On
    Toggle Off
  • Read
    Toggle On
    Toggle Off
Reading...
Front

Card Range To Study

through

image

Play button

image

Play button

image

Progress

1/19

Click to flip

Use LEFT and RIGHT arrow keys to navigate between flashcards;

Use UP and DOWN arrow keys to flip the card;

H to show hint;

A reads text to speech;

19 Cards in this Set

  • Front
  • Back

3 Core Cryptography Services

Encryption


Hashing


Authentication

CIA Triad

Confidentiality


Integrity


Availability

Two Open Source Encryption Products

TrueCrypt


PGP (Pretty Good Privacy)

Cryptographic Protocol and one of the oldest Key exchanges in field of cryptography uses symetric key ciper

Diffie-Hellman

EDH

Ephemeral Diffie-Hellman (or EDH) uses temporary public keys for symetric key ciperE

ECDH

Elliptical Curve Diffie-Hellman (or ECDH) is an anonymous key agreement protocol, which allows two parties to establish a secret over an insecure network. But each use has to have an elliptic curve, public-private key pair.

Cryptography used with fiber optic networks

Quantam Cryptography

Substitution Cipher

Example - In word "security," we may decide that every S will be equivalent to 3As and that an E would be equivalent to four Is.

Transposition Cipher

Transposition cipher takes the plaintext and shifts the characters or groups of characters according to a predefined regular system. So the ordering of the letters and numbers, for example, have been moved.

Running Key Cipher

Running key ciphers generally revolve around large chunks of written text such as a large word document, book, or article. The text is used to provide a very long key stream and then secretly referred to somewhere within the text documentation.

Concealment Cipher

Concealment cipher is a message within a message. For example, every tenth word in a PDF document may be part of a hidden message.


Block Cipher

Block ciphers are simply fixed-length groups of bits that has a special meaning specified by a symmetric key.

Stream Cipher

Stream cipher occurs when each plain digit text is encrypted one at a time with the corresponding digit of the key stream.

One Time Pad

One-time pad is defined as each bit or character from the plaintext being encrypted by a modular addition with a bit or character from a secret random key, or pad of the same length as the plaintext, resulting in ciphertext.

Cipher Modes of Operation

Cipher modes of operation include cipher feedback, output feedback, electronic code book, and cipher block chaining.

Cipher Feedback Mode

Cipher feedback takes a block cipher and converts it into a stream cipher.

Output Feedback Mode

Output feedback has some similarities to cipher feedback. In that, it permits encryption of different block sizes. The key difference is that the output of the encryption block function is the feedback, instead of the ciphertext.

ECB (Electronic Code Book)

ECB is a mode of operation for a block cipher, the characteristic that each possible block of plaintext has a defined corresponding ciphertext value and vice versa.

Cipher Block Chaining Mode

In Cipher block chaining mode each block of plaintext is exclusive OR – you'll see that as XOR – with the previous ciphertext blocks before being encrypted.