• Shuffle
    Toggle On
    Toggle Off
  • Alphabetize
    Toggle On
    Toggle Off
  • Front First
    Toggle On
    Toggle Off
  • Both Sides
    Toggle On
    Toggle Off
  • Read
    Toggle On
    Toggle Off
Reading...
Front

Card Range To Study

through

image

Play button

image

Play button

image

Progress

1/110

Click to flip

Use LEFT and RIGHT arrow keys to navigate between flashcards;

Use UP and DOWN arrow keys to flip the card;

H to show hint;

A reads text to speech;

110 Cards in this Set

  • Front
  • Back

Kerckhoffs principle

Auguste Kerckhoffs published a paper in 1883 stating that the only secrecy involved with acryptography system should be the key. He claimed that the algorithm should be publiclyknown. He asserted that if security were based on too many secrets, there would be morevulnerabilities to possibly exploitHe belived if security were based on too many secret, there would be more vulnarabilities.It opposes to security through obsecurity.


3Des

It used 168 bitUsing 3 different keys, k1, k2 and k3It has four versionsBoth third and fourth bit uses 112 bit

AES

AES Is also known as rijndael(rhine-doll) has been chosen to replace DES..NIST released FIPS 197 which mandatesnto use AES for all sensitive but unclassified data.It uses 3 key strength.128 (10 round) 292 (12 round) 256 (14 round)

Asymetric advantages and disadvantages

1.provide digital signature


2.addition of new users require only one public and private key.


3.users can be removed far easily


4.key regeneration is only requires when key is compromised


.5.it provides integrity, authentication and non repudiation


6. Key distribution is simple


7.no pre existing link to be establishedDisadvantages1.slow speed

Block cipher

Transposition cipher is an example of block cipher.Appky encryption to an entire message.Some modern encryption algorithm implement some type of block cipher.


BLOW FISH

It uses 64 bit block sizeIt uses key from 32 bit to 448Blowfish is faster than des and ideas.

CBC

It implements IV and XOR,


which generates unique output everytime the operation is performed.


If one block is corrupted during transmission it becomes impossible to decrypt that block and the next block as well



First block is XORed with a block of random data(IV) then eveey subsequent block of plain text is XORed with precious block.

Cerasor cipher

One of the earliest known cipher systems was used by Julius Caesar to communicate with Cicero in Rome while he was conquering Europe. you simply shift each letter of the alphabet three places to the right. For example, A would become D, and B would become E. Also known as ROT 3. It’s vulnerable to a type of attack known as frequencyanalysis

cryptography

The art of creating and implementing secret codes and ciphers isknown as cryptography also known as cryptovariable.

Cryptology

together cryptography and cryptanalysis is cryptology.

CTR

It uses a simple counter that increment for each operation..


Error do not propogate in CTR.CTR is well suited for parallel computing

DES

Its a 64 bit block cipher which has 5 modes.Key size is 56 bit1.ECB2.CBC3.CFB4.OFB5.CTRDES uses XOR to generate cipher and the process is 16btimes.


DES key is 64 bit or 56?

Only 56 contain keying information and the 8 bit contains parity information.


ECB

It is used for small amount of data and least secure.


If eaves dropping, it can build build a coodbook of all possible encryoted values.


Each time algorithm processb64 bit block it encrypt using the chosen key so if the algorithm find the same block multiple time it will produce the same encrypted block

Enigma

commercial code machine and its used for goverment.The machine used three to six rotors to implement an extremenly comlicated subsititution.


exploit of data in use

if process isolation is not implemented properly.

FIPS 140-2

Security Requirements forCryptographic Modules,” defines the hardware and softwarerequirements for cryptographic modules that the federal governmentuses.

Four fundamental goal of Cryptography

confidentialityIntegrity, authentication,nonrepudiation.

how to ensure message integrity

using encrypted message which is known is digital signature.


The receipt verified the message digital signature to ensure message is nto altered


.Each one timepad must be ised only once.


Key must be atleast as long as the message to be encrypted

Hownto ensure one time pad integrity.


1.mustbe randomly generated


2.must be physically protected

IDEA

It uses 64 bit blockIt uses 128 bit key. And is broken in 52 16 bit subkeys.



The sub key uses XOR with mod to produce encrypted /decrypted input message.


It uses same five mode used by DES. IDEA is also found in pgp.


IV

IVs are used to create unique ciphertext every time the samemessage is encrypted using the same key.

Ket management

Secure key generation


Secure key storage and use(key escrow)


Seperation of duties, dual control and split knowledge


Timely key rotation and key change


Key destruction

Key escrow and recovery

Two major approaches


1.fair crypto systems


2.escrowed encryption standard


Non repudiation

Nonrepudiation provides assurance to the recipient that the messagewas originated by the sender and not someone masquerading as thesender.Also prevent sender from denying that they never sent this message.Secret key/ symetric key and ( sinmple substituation cipher) do not provide non repudiation.

Nonce

Cryptography often gains strength by adding randomness to theencryption processNonce is a randome number when the function is executed nonce is replaced with the random number and nonce must be a unique number each time it;s used.Example : Initialization vector

Number of keys formula

Number of keys formula=n(n-1)/2


OFB

Almost the same fashiom as CFB.Instead of XORing, it uses XORS plain text with seed value.Future seed value are derived by running the DES algorithm on the previous seed value.There is no channing function and transmission error don't propagate to affect the decryption of future block.

One time pad

Is extremely powerfull substitute cipher.C=(p+k) mod 26Its also known as vernam cipher.


One time pad can be used only for short messages bexause of key length

Polyaalphabetic

Its a subsitiution cipher use multiple alphatbets in the same messagento hinder decryption effort.


Vigenere cipher is polyaalphabetic cipher.

RC4

It was used in 802.11 WEP. But it was vulnarable to modification attack.


RC5

Its a block cipher of variable block(32,64,128)Key size between 0 to 2040Rc5bis subject to bruteforce when using with 64bit and it takes 4 year to Crack single message. The number of round can go up to 255. New rc6 has been developed but not widely used.

Round of encryption

Each repetitions is known as round of encryption

Running key cipher

It is known as book cipher.Encryption is as long as the message.


SKIPJACK

It's approved by ua goverment in FIPS 185.escrowed encryption standard.


It uses 64 bit blockIt uses 80 bit key and supoort tje same 4 mode supported by DES.


Two agencies, NIST and department ofnthe treasury hold a portion of information required to reconstruct a skipjack key.


Law enforcement contact two agencies, obtain key and decrypt communication between the affected parties


Split knowledge

no single person has sufficientprivileges to compromise the security of an environment. Thisseparation of duties and two-person control contained in a singlesolution is called split knowledge.

Stream cipher

It operates on one charcter or bit of a message.Ceaser cipher is am example of stream cipher.Stream cipher can also fucntion as a block cipher

Symetric key algorithm

It relies on shared secret.


Its also known as secret key and private kry cryptography.


When used large key,


symetric algorithm is difficult to break


Symetric weakness and advantages

1.Key distribution is a major problem.2 it doesnt implement non repudiation3 algorithm is not scalable4.key must be regenerated oftenAdvantages.Faster 1000 to 10000 then asymmetric

Twofish

Is another one OF AES finalist.Its a block cipherBlock size 128Key size is 256It uses two techniques which is not found in any other.1.prewhitening involves XORing the plain text with sperate sub key befire first round of encryption2.postwhiting, its uses similar operation after 16th round of encryption.


Ultra

alan turing broke engima in 1940 using the cryptabnalysis known as ultra.Japanese used like engima machine " Japanese purple" which was also broken using ulta.

Well knows Symetric algorithm

DES3DESBLOWFISHIDEARC4, RC5 AND RC6AES

which cryptosystme is one way

Public key cryptosystems are all based on some sort of one-way function.

which cryptosystme is one way

Public key cryptosystems are all based on some sort of one-way function.

work function

You can measure the strength of a cryptography system by measuring.1. effort in temrf of cost.


2.work fucntion or work factor.



The security and protection offered by a cryptosystem is directly proportional to the value of the workfunction/factor.size of work factor should match the value of protected assets.crypto system should be cost effective ( mean work function need to be slightly higher than the value of

2 digital signature ny name

Schnorr'SNyberg-rueppels signature algorithm

ADEPT

Adobe digital experience protectionProvides DRM technology for e books sold in a variety of format.


It uses AES to encrypt the content and RSA to protect the AES key..

Analytic attack

Attemot to reducr the complexity of the algorithm. It foxuses on logic.


Certificate authorities

Symentec


Identrust


Amazon


Globalsign


Certum


Comodo


Digicert.


secom


Entrust


Actalis


Trustwave



Certificate comply with X. 509 contains the following

1.version


2 serial number


3.Signature algorithm identifiers


4.issuer name


5.validity period


6.subjects name


7.subjects public key


Certificate verification

1.digital signature of CA is authentic


2.you trust the CA


3.the certificate is not listed on a CRL


4.the certificate actually contains the data you are trusting.

Certification generation and destruction

1.enrollment2.verification3 revocation4.CRL5.OCSP


Chosen cipher attack

Ability to decrypt chosen portion of cipher text adn disxover the key


CPV

Important to verify that every link between trusted endpoints remain current, valid and trustworthy

Crypto system provide almost equal protection.

RSA 1024DSA 1024ELLIPTIC CURVE 160

Digital signature

1.It provides non repudiation2.it also ensures that the message is not altered.It provides, integrity, authentication non repudiation

Document DRM

It is used also to protect the security of sensitive information stored in pdf file.Commecial DRM product1.vitrium2.fileopen


EL GAMAL

1985 It proposes how defi hellman coukd ve extended to support an entire public key cryptosystem used for encrypting and decrypting messages.


.El gamal has major disadvantages thst it doubles the length of any message it encrypts.


This present hardship when encrypting and transmitting over a narrow bandwidth.

Eliptic curve

Neal koblitz built in 1985 from University of washington and victor miller from IBM


.


Y2=x3+ax+b



It widely believe that this problem is harder to solve than bothbthe prime factorization problem that RSA is based on and discreate logarithm utlizied by diffie hellman.Its key 160 is equal to RSA 1024

Encryption on portable devices

EFS on windowsFile vault encryption in MACVeracrypt open source in linux, mac and windows


End to end encryption


End to end encryption

Doesnt encypt the following


1.header


2.trailer


3.address


4.routingbdataIt moves faster but Sucpectibility to eaves dropping.Ssh


HAVAL

Hash og variable lengthIt uses 1034 bit block and produces the following hash value.128160192224.256

HMAC

It implementa partial digital signature.It guarantees of message integrity but does not provide nin repudiationIt relies on shared secret key(symetric)It can be combined with public key cryptography like SHA 3.



1.concatenated message


2.hashing algorithm


3.symmetric key


Implementatiom attack

It focuses on exploiting software code.Not just the error or flaw but methodology.


IPSEC

AH


ESP


Esp is sometime used without AH But its rarento see AH used without ESP



AH


1.INTEGRITY


2.non repudiation


3 authentication


4 access control



ESP


1confidentiality


2 integrity


3.limited authentication


3.prevent replay attack

Ipsec two modes

Transport


Tunnel mode


Trasnport Only packet payliad is encrypted



TunnelThe entire packet including the header this mode is designed for gateway to gateway communications


Link encryption

Creating a secure tunnelIt encrypts all data including the header, trailer, addrsss routing data.

Mark-hellman knapsack

It waa developed a year after RSA was publicized.Its not on based of perdorming factoring operation but relies on a component of theory (known as "super increasing sets) rather than on largebprime number.It was proven in effective in 1984.

MD2

Developed in 1989It provides a sexure hash function for 18 bit processor.


Md2 pads the message so that its length 128 bit message digest generated by using entore orognal message and apoended checksum.


.If checksum is not appended before digestion then collision may occur.FREDERIC MUELLER proved



MD2 is not a one way function.


MD4

Its used 32 nit processorIts pads the message to ensure that the message length is 64 bit smaller than a multiple of 512 bits.


Md4 process 512 bit block in three round of computation.


Final. Output is 128 bit.


MD5

1991It uses 512 bit block of message.


Its uses four distict round of computation to produce a disgest of same length md2, md4 (128 bit)It has a same padding requirement as md4.


It imlement additional securiry the reduces speed of message digest production.

Message digest.

Also other name.HashHash valueHash totalCRCfingerprintChecksumDigital ID.


A single value can be used to perform tje function of parity.


A low level or single digit checksum value used to provide a single indivisual point of verification.

Moors law

Computing power doubles approximately every two years.


If takes current computer one year to break your code.,


it will take 3 month if the attempt is made after 4 years.

NIST digital signature standard

FIPS 186-4 also known as DSS.It specifies all document must use SHA-3

PGP COMMERCIAL

Uses RSA for key exchangeIdea for encryption/decryptionMd5 for message digestion.


Pgp email based services

StartmailMailenvelopSafegmailHushmail

PGP freeware

It uses diffe helman for jey excamhangeIt uses cast 128 bit foe encryption / decryptionIt uses SHA1 for hashing

PKI STEPS

1.john makes a request to RA


2.The RA request this information. Driver licnese


Phone number


His address


Other identifying information


3.once RA receive this information, RA sends his certificate request to CA



4.CA creates a certificate with Johns public key and identifying info embedded.(the public/private keybis generated by CA or john machine.



Note :in most cases, the user generates this pair and sends in his publix key during registration

Replay attack

It intercept the an ecrypted message between two parties and replay to open new session.


This can be defeated using time stamp adn expiry period


Revocation grace period

Revocation grace period is the maximum response time within which a CA will perform any requested revocation.


Its defines in CPSCertificate practice statement

RSA

1. n=p*q


2.e is less than n


3.e and (p-1) (q-1) are prime numbers


4.find d which ia secret key (ed-1)mod(p-1)*(q-1)=1C=p^e mod nP=c^d mod n

S/MIME

De facto standard for encrypted email.It uses RSA and has backing of majority players, inckuding RSA security.It uses X. 509 for exchanging cryptographic keys.


It uses AES adn 3DES for encryption/ decryption.


Its incorporated with the following.1.Microsoft outlook and office 3652


.mozila thunderbird3.Mac OS X mail4.Gsuit enterprise edition


SHA

Sha1, 2 and 3 are governement standard defined by NIST.Its called SHS and FIPS-180


SHA1

It takes any input approximately 2097152And produce 160 message digest.SHA 1 processes a message 512 bit blocks, if message length is not multiple of 512 then sha will repeat it until reaches 512.Crypt analysis demonstrated weakness which led to creation of sha2

SHA2

SHA 256 produces 256 bit message using 512 block sizeSHA 224 uses a truncated version og SHA 256 hash and produces 224 bit messageSHA 512 produces a 512 bit message digest using a 1024 bit size.SHA 384 uses a truncated version of SHA 512 produces 384 using 1024 bit block size.

Specialize hashing fucntion which adds salt

1.Pbkdf22.Bcrypts3.scrypt

SSH1

Support1.Des2.idea.3.3 des4.bliw fish.

Statistical attack

Explotis the floatinf point erroe and inability toRandom numbers.It also find vulbarability in hardware and software hostinf cryptosystem..


TPM

Is a microchip installed on the motherboard and is dedicated to carryingout security functions like.Storage and processing symetr3and asymmetric keys, hashea and digital certificatesTPM is devised by TCG

Two major technology used to protect mass distributed media.

Two major technology used to protect mass distributed media.HDCPAACS

Web application

TLS v1. 2 dropped backword compatibility2014 major flaw poodle indentified in SSL v3. 0TLS has gained a name SSL 3.1

What is endorsed copy of indivisual pblic key

Digital signature

What permission does document DRM put

1.reading a file2.modifying the content of a file3.removing watermarka feom a file4.downloading /saving5.printing a file6.taking screenshot of file content .

When adopting security for email? What is the effective solution?

Simplicity

Which 3 standard encryption algorithm is specified by DSS.

DSA - FIPS-186RSA X9.31 ECDSA specified in ANSI X9. 62

Certificate classes and type

Most common letter in the english

ETAONRISH

Confusion

When relationship between plaintext and the key is so complicated.



Also multiple round of subsitiution

Diffusion

It occurs when a change in the plaintext result multiple changes.



Multiple round of transposition

Same pattern encryption

Des


Idea


Blowfish

Symetric chart

HAVAL

1024 bit block size



Key


128


260


224


256

Hash algorithm chart

Cast

Used in pgp free version


128 bit

Supplicant

To use 802.1x, client runs a piece of softwate known as suplicant

Attack identity

ETAOIN is found then its most likely trasnposition cipher



Otherwise it will be subsitiution cipher.

Side channel attack

DSA

DSS IS A FEDERAL standard security standard that governs DSA.



DSA generates 160 bits


It only provide digital signature

What RSA provides

RSA provides digital signatures, encryption, and secure

quadrent in risk assesment

quadrent in risk assesment