Chapter 6 Flashcards

(78 cards)

1
Q

4 fundamental goals of cryptography

A
  1. confidentiality
  2. integrity
  3. authentication
  4. non-repudiation
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

which goal ensures data remains private?

Confidentiality
Integrity
Authentication
Non-repudiation

A

Confidentiality

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

which kind of cryptography uses a shared secret key?

A

Symmetric

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

which kind of cryptography uses a combiniation public and private key?

A

asymmetric

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

which goal ensures that data is not altered without authorization?

Confidentiality
Integrity
Authentication
Non-Repudiation

A

Integrity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

what do encrypted message digests (digital signatures) enforce?

A

integrity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

which goal verifies the claimed identity of system users?

Confidentiality
Integrity
Authentication
Non-Repudiation

A

Authentication

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What does a challenge-response protocol prove?

A

Authentication

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

which goal assures that someone cannot claim they never did something?

Confidentiality
Integrity
Authentication
Non-Repudiation

A

Non-Repudiation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

which cryptosystem ensures nonrepudiation?

A

asymmetric

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

what is key space?

A

the range of values that are valid for use as a key for an algorithm

2^n where n is the bit size of the key

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

algorithms are made known and public, allowing anyone to examine and test them to ensure that a cryptographic system is secure even if everything about they system except the key is known

A

Kerckhoff’s principle

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

which standard defines the hardware and software requirements for cryptographic modules used by the federal government?

A

FIPS - Federal Information Processing Standard

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

random number that acts as a placeholder variable

A

nonce

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

key escrow

A

a cryptographic key is stored with a third party (recovery agent) for safekeeping

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

work function

A

the amount of time it takes to brute-force an encryption system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

how is a code different than a cipher

A

a cipher is a mathematical function that hides the true meaning of the original message. A code works on words or phrases and can be used to shorten phrases and is not necessarily meant to hide the meaning of the message.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Requirements for successful use of one-time pad

A
  1. key must be generated randomly
  2. key must be at least as long as the message
  3. pads must be protected against physical disclosure
  4. each pad must be used only one time
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

in this cipher, the encryption key is as long as the message and is chosen from a common book, newspaper, or magazine

A

running key cipher / book cipher

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

this cipher operates on chunks of a messages

A

block ciphers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

this cipher operates on one character or bit of a message at a time

A

stream ciphers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

key management best practices (3)

A

store keys securely
select keys using an approach that has as much randomness as possible
destroy keys when they are no longer needed

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

in what type of cryptography is the same key used to encrypt and decrypt the message?

A

symmetric
secret key
private key

“S”ymmetric = “S”ame key

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

4 problems of symmetric key cryptography

A
  1. key distribution - how do you share a key securely?
  2. does not implement non-repudiation
  3. not scalable - need to have a separate shared key for each person you talk to
  4. keys must be regenerated often
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
major strength of symmetric key cryptography
it can be implemented (encryption and decryption) very quickly
26
which type of cryptography requires two separate (but related) keys to encrypt and decrypt?
Asymmetric
27
6 strengths of asymmetric key cryptography
1. each user only needs a single public and private key 2. users are easily removed 3. key regeneration is only required when a private key is compromised 4. provides integrity, authentication, and nonrepudiation 5. key distribution is simple 6. no pre-existing link needs to exist for secure data exchange
28
Which cryptographic mode encrypts 64-bit blocks with a chosen secret key?
Electronic Code Book (ECB)
29
which cryptographic method uses XOR on each block with the block of ciphertext immediately preceding it before it is encrypted?
CBC - Cipher Block Chaining
30
as the memory buffer becomes full, it is encrypted; this mode uses and IV and chaining similarly to CBC but uses real-time data
CFB - Cipher Feedback Mode
31
this mode is similar to CFB, but XORs plaintext with a seed value that is created from the IV
OFB - Output FeedBack mode
32
stream cipher uses a counter that increments for each operation errors do not propogate
CTR - Counter Mode
33
adds data authenticity controls to CTR mode with authentication tags
GCM - Galois/Counter Mode
34
combination of CTR with CBC-MAC used with 128-bit block length and requires use of a nonce for each transmission
CCM - Counter with Cipher Block Chaining Message Authentication Code Mode
35
authenticated modes of encryption (2)
GCM - Galois/Counter Mode CCM
36
unauthenticated modes of encryption
ECB - Electronic Code Book CBC - Cipher Block Chaining CFB - Cipher Feedback OFB - Output Feedback CTR - Counter
37
DES block size
64 bits
38
DES modes
ECB CBC CFB OFB CTR
39
DES key length
56 bits 8 bits of a 64 bit key are supposed to be used for parity
40
DES rounds of encryption
16
41
4 variants of 3DES
DES-EEE3 DES-EDE1 DES-EEE2 DES-EDE2
42
block size of IDEA (International Data Encryption Algorithm)
64 bits
43
starting key size of IDEA
128 bits
44
size and number of subkeys of IDEA
52 16-bit subkeys
45
5 modes of IDEA
the unauthenticated modes ECB, CBC, CFB, OFB, CTR
46
Blowfish block size
64-bit
47
this encryption algorithm was released for public use with no license required and created by Bruce Schneier
Blowfish
48
Skipjack block size
64-bits
49
Skipjack key size
80 bit
50
which encryption algorithm supports key escrow?
Skipjack
51
which cipher was integrated into the WEP, WPA, SSL, and TLS protocols?
RC4
52
Is RC4 still secure?
No
53
key sizes of RC4
40 - 2048
54
is RC4 block or stream?
stream
55
is RC5 block or stream?
block
56
block sizes of RC5
32, 64, or 128 bits
57
key sizes of RC5
0 and 2040
58
is RC6 block or stream?
block
59
block size of RC5
128-bit
60
key size of RC5
128, 192, or 256-bit keys
61
three key strengths allowed by AES
128, 192, 256-bit
62
which cipher replaced DES?
Rijndael
63
AES rounds of encryption for 128-bit keys
10 rounds
64
AES rounds for 192-bit keys
12 rounds
65
AES rounds required for 256-bit keys
14 rounds
66
Which kinds of algorithms use a Feistel network?
CAST
67
is Twofish block or stream?
block
68
Twofish block size
128-bits
69
which algorithm uses the prewhitening and postwhitening techniques?
Twofish
70
3 methods used to exchange secret keys
offline distribution public key encryption diffie-hellman key exchange algorithm
71
which key storage option stores keys as digital objects on the system where they are used?
software-based key storage
72
which key storage mechanism is easier to implement?
software-based key storage
73
which key storage mechanism uses dedicated hardware devices like flash drives or smartcards?
Hardware-based storage
74
which enterprise device manages keys for an organization?
HSM - Hardware Security Modules
75
what is the purpose of key escrow systems?
to allow the government to obtain to cryptographic key for a particular communication from a central storage facility
76
two major approaches to key escrow
fair cryptosystem escrowed encryption standard
77
which key escrow approach splits the keys up into two or more pieces, each of which is provided to a different independent third party that the government can retrieve the parts from in order to reconstruct the key
fair crypotsystems
78
which escrow approach provides the government a technological means to decrypt cipher text?
escrowed encryption standard