Cryptography Flashcards

0
Q

IPsec

A

Only through IP networks

Provides integrity, confidentiality, SYSTEM authentication

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
1
Q

S-HTTP

A

Used to encrypt individual messages between two computers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Zero Knowledge proof

A

Proving that you have a specific key without sharing that key or showing it to anyone

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Transposition cipher

A

Rearranging characters

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Substitution cipher

A

Exchanging characters

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

DES

A

Algorithm: Data Encryption Algorithm (64bit)
(name changed from Lucifer (128bit))
Block cipher
Symmetric
64bit key (8 bit for parity, so true key is 56 bit)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

AES

A

Advanced Encryption Algorithm
Using rijndael algorithm
Used to bulk encrypt data
Symmetric

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

PGP

A

Pretty good privacy

Hybrid symmetric/asymmetric free crypto system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

SET

A

Secure electronic transaction
Supposed to replace SSL
Developed by MasterCard and Visa
Too much overhead = not adopted

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Block cipher

A
Using substitution boxes (s-boxes) 
For bulk data
Fixed length grp of bits
Symmetric
Substitution and permutation
DES, AES, IDEA, RC5, BLOWFISH
ECB - electronic code book (encrypt CC numbers)
CBC - cipher block chaining (encrypt documents)
CFB - cipher feedback mode
OFB - output feedback
CTR - counter mode
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

IDEA

A

128bit
Block cipher
64bit block, broken into 16subblocks and send trough 8 rounds of permutation
- meant to replace DES, but patented and requiring license fees

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Link encryption

A

Encrypts everything but data link messaging

Working in datalink and physical layer of OSI model

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

HMAC

A

Massage authentication code
Symmetric key is added to the message and result put through hashing algorithm = MAC
- integrity
- system or data authentication

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

CBC-MAC

A

Using block cipher to create MAC, which is the last block of cipher text
Only integrity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

RSA

A

Asymmetric
Data encryption, key exchange, digital signature
Rivest - Shamir - Adleman
- based on difficulty to factor large numbers into their original prime numbers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Key clustering

A

Different keys generate the same cipher text from the same clear text

16
Q

Algorithm work factor

A

Amount of time and resource needed to break the encryption process or the crypto system