Chapter 7 Flashcards
Cryptography and the PKI (65 cards)
Cryptography
The practice of encoding information in a manner that it cannot be decoded without access to the required decryption key.
What are the four common goals of Cryptography?
Two stem from the CIA Triad and the other two do not:
- Confidentiality
- Integrity
- Authorization
- Non-Repudiation
Cipher
A method used to scramble or obfuscate characters to their value.
Substitution Cipher
A type of coding or ciphering system that changes one character or symbol into another.
Stream Cipher
Operate on one character or bit of a message (or data stream) at a time.
Block cipher
Operate on “chunks,” or blocks, of a message and apply the encryption algorithm to an entire message block at the same time.
Transposition Cipher
Transposing or scrambling the letters in a certain manner.
Steganography
The art of using cryptographic techniques to embed secret messages within another file. Like hiding messages in images.
Symmetric Cryptosystems
Use a shared secret key available to all users of the cryptosystem.
Asymmetric Cryptosystems
*keys
Uses individual combinations of public and private keys for each user of the system.
What is the most common way to protect network communications using sensitive data?
With the (TLS) Transport Layer Security Protocol.
Full Disk Encryption (FDE)
A form of encryption where all data on a hard drive is automatically encrypted, including the operating system and system files.
Partition Encryption
Similar to FDE but targets a specific partition of a hard drive instead of the entire disk.
File-Level Encryption
This method allows users to encrypt specific files rather than entire drives or partitions. Not as secure as FDE or partition encryption.
Volume Encryption
Involves encrypting a set “volume” on a storage device, which could contain several folders and files.
Database Encryption
A method used to protect sensitive information stored in a database from access by unauthorized individuals. There are two types: TDE and CLE.
Transparent Data Encryption (TDE)
Encrypts entire databases.
Column-Level Encryption (CLE)
Allows specific columns within tables to be encrypted.
Record-Level Encryption
It allows individual records within a database to be encrypted.
Cryptographic Keys
Nothing more than a number, usually a very large binary number.
Key Space
The range of values that are valid for use as a key for a specific algorithm. The total set of possible keys that can be used in an encryption system. The larger the key space, the harder it is for an attacker to guess the correct key through brute force.
Key Length
The number of binary bits (0s and 1s) in the key.
Key Exchange
The secure distribution of the secret keys required to operate the algorithms. The three main methods are offline distribution, public key encryption, and the Diffie–Hellman key exchange algorithm
Kerckhoffs’ Principle
Also known as Kerckhoffs’ assumption, is that a cryptographic system should be secure even if everything about the system, except the key, is public knowledge. The principle is basically: The enemy knows the system.