Chapter 3: Encryption and Related Technologies Flashcards
(194 cards)
What is homomorphic encryption?
Allows encrypted information to be manipulated without decrypting it first (data in use)
What is multiparty computation?
Allows two or more computers to participate in a computation and compute a mathematical result without otherwise revealing private information
What does the term encrypt mean?
To convert information or data into a cypher or code
What is a cypher?
Mathematical transformations of data, in which data is scrambled according to some kind of function
What is a code?
Transformations that typically involve a one-to-one replacement of a word, letter, figure or symbol with another word, letter, figure or symbol
What is the difference between plaintext and cyphertext?
Plaintext - clear and readable text
Cyphertext - the encrypted message
What is the work factor?
The amount of effort that an adversary needs to expend to decrypt a message
What is threat modeling?
Understanding the adversary the system has been designed to protect against, the capabilities that adversary has, and the likely forms of attack the system may experience
What is a cryptographic system?
Collection of cryptographic algorithms, protocols, software and other items that use cryptography to achieve information security goals
What factors can cause cryptographic implementation flaws?
- Bugs - Implementation errors
- Back doors - Flaws that have been deliberately placed in a product for later exploitation
- Weaknesses - Mathematical vulnerabilities that are unknown when they are developed and deployed but are later discovered
- Obsolescence - Erosion over time
Why is entropy important?
Merely encrypting with an algorithm and a key is not sufficient to ensure security. It is also necessary to use randomness, also called entropy, so that an attacker observing the output of an encryption system cannot determine if the same message is encrypted a second time
Where must entropy be applied in modern cryptographic systems?
Both in creating keys and encrypting messages
List the 2 kinds of encryption algorithms
Secret key algorithms (aka symmetric)
Public key algorithms (aka asymmetric)
What is a symmetric or secret key algorithm?
Uses the same key to encrypt and decrypt the plaintext
What is an asymmetric or public key algorithm?
Designed so that the plaintext can be encrypted using only public information, but decrypting the cyphertext requires the use of private information
Is RSA a symmetric or asymmetric algorithm?
Asymmetric
What is the most common symmetric algorithm in use today?
AES - typically used with 128 or 256 bit keys
What is a brute force attack?
Try every possible key
What is another name for a brute force attack?
Key search attack
What technology will theoretically be capable of breaking 128-bit AES with relative ease?
A sufficiently large quantum computer
Though it is believes that it will not have the ability to crack AES-256 in any reasonable amount of time
Why is it a bad idea to develop your own encryption algorithm?
Secret algorithms are typically weaker because they have not been as widely tested
It is also difficult to understand the risk of using such an algorithm
What are the differences between a cryptographic key and a password?
With a cryptographic key
• Information must be mathematically transformed
• Does not decide whether or not to grant access
• Cannot be reset if the key is lost
• To change the key you have to decrypt then re-encrypt the information
With a password
• Access to the controlled information is mediated by a program
• Because the program is making decisions, it can be manipulated by other factors (ex. the system allows access without a password Thursdays at 5)
• Software accessed confidential parts of the program even when a password is not provided
Which private key algorithm was published by the US government in their Federal Information Processing Standard (FIPS) in 1977?
Data Encryption Standard (DES)
A public demonstration in 1998 showed that DES could be broken, what was the solution?
Encrypting a message with DES three time over, each time with a different key (a technique called triple DES or 3DES)