01 - Flash Cards
(64 cards)
1
Q
Cryptography
A
- Cryptography is a security technology used to provide security, integrity and authentication to information that is either stored, in transit or in use.
2
Q
Caesar Cipher
A
- It is the earliest known cryptographic method used by Julius Caesar. In this cryptographic system, the coded message is formed by shifting every letter of the alphabet by three to the right.
3
Q
Goals of Cryptography
A
- Confidentiality
- Integrity
- Authentication
- Nonrepudiation
4
Q
Confidentiality
A
- Provides data privacy and security when data is being stored, in transit or used.
5
Q
Types of Cryptosystems
A
- Symmetric cryptosystem
- Asymmetric cryptosystem
6
Q
Symmetric cryptosystem
A
- All cryptosystem users have shared secret key available to them.
7
Q
Asymmetric cryptosystem
A
- Every user has an individual key which is a combination of public and private key.
8
Q
Three Types of Data in Cryptographic System
A
- Data at rest
- Data in motion
- Data in use
9
Q
Data at rest
A
- Data stored at a permanent location. For example hard drives, could etc
10
Q
Data in motion
A
- Data being transmitted between two systems, across a network.
- Also known as data on wire.
11
Q
Data in use
A
- Data located in the active memory of a computer.
12
Q
Integrity
A
- Provides assurance that data is not altered without authorization.
13
Q
Authentication
A
- An important feature of cryptosystems as it ensures the identity of a system user.
14
Q
Nonrepudiation
A
- Provides assurance to the recipient that the message was provided by the original sender and not someone masquerading as the sender.
15
Q
Plaintext Message
A
- Message before it is put into an encrypted form.
- It is labelled by letter P.
16
Q
Ciphertext Message
A
- Plaintext message encrypted by using a cryptographic algorithm. It is labelled by letter C.
17
Q
Key space
A
- Set of values that are allowed/valid to be used as a key for a particular algorithm. It is defined by a bit size.
18
Q
The Kerckhoff Principle
A
- Cryptographic system assumed to be secure even when everything about it, except the key, is known to the public.
19
Q
Cryptovariable
A
- Another name for cryptographic key.
20
Q
Cryptography
A
- Creation and implementation of codes and ciphers.
21
Q
Cryptanalysis
A
- Methods used for decoding/deciphering.
22
Q
Cryptology
A
- Combination of cryptography and cryptanalysis.
23
Q
Cryptosystem
A
- Installation of code/cipher into a software/hardware system.
24
Q
Boolean Mathematics
A
- Set of rules used to work with digital circuits (bytes and bits). It is a binary system based on two values - 1 and 0, true and false, respectively.
25
AND Operation
* Operation that examines whether out of two values both values are true.
26
OR Operation
* Operation that examines whether at least one of the values is true.
27
NOT Operation
* Operation that reverse the value of the variable.
* For example, 1 is changed to 0.
28
Exclusive OR (XOR)
* Returns a true value when only one of the input variables is true.
* In case that both variables are false or both variables are true, XOR output will be false.
29
Modulo Function
* Finds a reminder of division of one number by another.
30
One- Way Functions
* Operation that produces output values for all the possible combinations of a particular set of input variables.
* However, it makes it impossible to retrieve the input variables.
31
Nonce
* It is an arbitrary number that serves as a proxy variable in a mathematical function.
32
Zero- Knowledge Proof
* Method by which one party can prove knowledge of a certain fact to another party without revealing the actual fact.
33
Split Knowledge
* Information to perform a certain operation is split among users in such way that no single user has sufficient knowledge to compromise the security.
34
Work Function
* A way to measure the strength of a particular cryptosystem.
* The protection provided by a cryptosystem is directly correlated to its work factor/function.
35
Code vs Cipher
* Code refers to symbol that may be used to substitute a word/phrase and does not necessarily provide confidentiality, while cipher is always meant to conceal data/information and provide confidentiality.
36
Transposition Ciphers
* Algorithms used to transform plaintext into ciphertext.
37
Substitution Ciphers
* Encryption method that substitutes every character in a plaintext with a different character.
38
One-Time Pad
* Encryption method that uses different substitution alphabet for each character in a plaintext. It uses a key that is at least long as the message.
39
Running Key Ciphers (Book Ciphers)
* Encryption key used is at least as long as a message and it is taken from a common book.
40
Block Ciphers
* It is an encryption algorithm operating on a fixed number of bits, called a block.
41
Stream Ciphers
* It is a key cipher that operates on one bit of a message or on one character at the time.
42
Confusion
* An extremely complicated relationship between the plaintext and key that makes it impossible for the attacker to determine the key by changing the plaintext and analysing the its ciphertext.
43
Diffusion
* One change in plaintext leads to multiple changes in the ciphertext.
44
Weaknesses of Symmetric Cryptography
* Key distribution
* Does not implement nonrepudiation
* Algorithm is not scalable
* Keys are to be regenerated often
45
Strengths of Asymmetric Cryptography
* Addition of new users requires generation of only one key pair
* User are more easily removed from the system
* Key regeneration is required only when a private key is compromised
* Provides integrity, authentication, and nonrepudiation
* Key distribution is simple
* Pre-existing communication link does not need to exist
46
Data Encryption Standard
* 64-bit block cipher that was proposed in 1977 by the US government as a standard cryptosystem to be used for all government communication.
* No longer considered to be secure.
47
DES - Five Modes of Operation
* Electronic Code Book mode
* Cipher Block Chaining mode
* Cipher Feedback mode
* Output feedback mode
* Counter mode
48
Electronic Code Book Mode
* Mode of operation that for every processed 64-bit block produces an encrypted block using the secret key.
49
Cipher Block Chaining Mode
* Mode of operation that XORs each block of unencrypted text with the ciphertext preceding and then it encrypts it using DES algorithm.
50
Cipher Feedback Mode
* Mode of operation that works against data produced in real time.
51
Output Feedback Mode
* Mode of operation that XORs plaintext with a seed value.
52
Counter Mode
* Mode of operation similar to CFB and OFB; uses a simple counter increments for each operation.
53
Triple DES
* Adapted version of DES that uses three different keys.
54
International Data Encryption Algorithm (IDEA)
* Algorithm that begins the operation with a 128-bit key which is then broken up into 52 16-bit subkeys. These keys then act on input text using XOR and mode of operations to produce cryptographic version of the message.
55
Blowfish
* Expands on the IDEA principle as it allows the use of variable lengths keys ranging from 32-bit to 448-bit.
56
Skipjack
* Algorithm that operates on 64-bit blocks, uses and 80-bit key, and uses the same modes of operation as DES.
* It also supports escrows of encryption keys.
57
Advanced Encryption Standard
* Block cipher that has been chosen to replace DES.
* It uses three keys of different strengths: 128 bit, 192 bit, and 256 bit.
58
Key Management Practices
* Safeguards around secret key creation, distribution, storage, destruction, recovery, and escrow.
59
Symmetric Key Exchange
* Offline distribution
* Public key encryption
* Diffie-Hellman key exchange algorithm
60
Symmetric Key Storage and Destruction Principles
* Never store the encryption key in the same site where encrypted data is located
* Provide two different individuals with half of the key
61
Key Escrow Approaches
* Fair cryptosystems
* Escrowed encryption standard
62
Fair Cryptosystems
* Secret keys are divided into 2 or more pieces and given to a third party.
63
Escrowed Encryption Standard
* Basis behind Skipjack; it provides governments with the ability to decipher encrypted data.
64