Lesson 3 Flashcards

1
Q

symmetric cryptography

A

A cryptography system that uses a single shared encryption key to encrypt and decrypt data. Best suited for bulk encryption

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Symmetric Cryptography formula

A

N(N-1)/2 = number of keys needed

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Two types of symmetric algorithms

A

Stream Cipher / Stream Algorithm

Block Cipher / Block Algorithm

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

XOR Stream Cipher

A

An exclusive disjunction, which means that it produces an output of truth
(or 1) whenever the two inputs differ (such as one is a zero [false] and the other is a one [true]).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

C32 BRAIDS

A

C ast 128 / 256 (64 bit/128 bit)
3 DES 2-112 bit / 3-168 bit (48 Rds)
2 fish 128 bit
B lowfish 64 bit
R C 4 (Stream and WEP) 5,6 (Block)
A ES 128 bit Block (128/10)(192/12)(256/14)
I DEA 64 bit Block / 128 key
D ES 64 bit Block / 56 bit key (8 bit parity)
S afer+, Safer++

Symmetric Algorithms

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

3DES

A

A standard that uses three iterations of DES with two or three different
keys to increase the effective key strength to 112 bits

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Advanced Encryption Standard (AES)

A

The encryption standard selected in October
2000 by the National Institute of Standards and Technology (NIST) that is based on the
Rijndael cipher.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Escrowed Encryption

A

Trusted 3rd party keeps copy of private key pair

Provide a balance between privacy and the needs of law enforcement

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Clipper Chip

A

Used 80 bit symmetric encryption with the Skipjack algorithm (classified up

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

asymmetric key

A

A form of cryptography that does not use symmetric keys. It either uses complex formulas to solve problems (such as Diffie-Hellman to generate/exchange symmetric
keys) or uses key pair sets to provide digital signatures and digital envelopes.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

DEER

A

D iffie-Hellman
E CC
E lGamal
R SA

Asymmetric Algorithms

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Hashed Message Authentication Code (HMAC)

A

An algorithm that implements a partial
digital signature—it guarantees the integrity of a message during transmission, but it does
not provide for nonrepudiation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

A forward-looking
concept that has no publicly known current real-world applications or uses. The idea is to take advantage of the dual nature of light at the quantum level, where it acts both as a wave and as a particle

A

quantum cryptography

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

A hierarchy of trust relationships that makes it possible to
facilitate communication between parties previously unknown to each other

A

public-key infrastructure (PKI)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly