Chapter 8 Flashcards

1
Q

Cryptography

A

The study of cryptographic algorithms 245

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Ciphering

A

The process of using cipher to encode characters 245

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Substitution Cipher

A

A type of coding or ciphering system that changes one character or symbol into another 246

Like a cryptogram 246

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Multi-Alphabet Substitution

A

Really cool way to cipher a message. Takes substitution to the next level by changing the formula with every character 246

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Transposition Cipher

A

Involves transposing or scrambling the letters in a certain manner. Typically, a message is broken into blocks of equal size, and each block is then scrambled 246

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

ROT13

A

rotates every letter 13 places in the alphabet

Little orphan Annie!

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Stegography

A

process of hiding a message in a medium such as a digital image

Most commonly by changing the least significant bit 248

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Symmetric Algorithms

A

Requires both ends of an encrypted message to have the same key and processing algorithms.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Asymmetric Algorthms

A

Use two keys to encrypt and decrypt data. The two keys are known as a public key and a private key

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Types of Key exchange

A

In-band key exchange: the key is exchanged within the same communications channel is encrypted

Out-of-band key exchange: Key is exchanged in a different channel

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

ECC

A

Elliptic Curve Cryptography

uses small keys.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

MD

A

Message Digest Algorithm

Creates a hash value and uses a one way hash

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Key stretching

A

processes used to take a key that might be a bit weak and make it stronger usually by making it longer
256

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Frequency Analysis

A

looking at blocks of an encrypted message to determine if any common patterns exist
257

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Brute-Force Attacks

A

Applying every possible combination of characters that could be the key
257

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Cryptographic system

A

system, methods, or process that is used to provide encryption and decryption
258

17
Q

Digital Signature

A

similar in function to a standard signature on a document. It validates the integrity of the message and the sender
261

18
Q

Nonrepudiation

A

Prevents a party from denying action they carried out.

262

19
Q

Key Escrow

A

addresses the possibility that a third party may need to access keys. Keys needed to encrypt/decrypt data are held in this
262

20
Q

Key Recovery Agent

A

an entity that has the ability to recover keys, key components, or plaintext messages as needed

21
Q

Key Registration

A

the process of providing certificates to users, and registration authority

22
Q

IETF

A

Internet Engineering Task Force

an international community of computer professional that includes network engineers, vendors, administrators, and researchers

23
Q

ISOC

A

Internet Society

Professional group whose membership consists primarily of Internet experts

24
Q

W3C

A

World Wide Web Consortium

An association concerned with the interoperability, growth, and standardization of the WWW

25
Q

RFC

A

Request for Comments

A draft/document that is open for comment to ensure that it meets standards and best practices

26
Q

IETF

A

Internet Engineering Task Force

An international community of computer professionals that includes network engineers, vendors, administrators, and researchers
265

27
Q

X.509

A

Standard defines the certificate formats and fields for public keys. It also defines the procedures that should be used to distribute public keys
267

28
Q

PKIX

A

Public-Key Infrastructure X.509

working group formed by the IETF to develop standards and models for the PKI
environment
266

29
Q

SET

A

Secure Electronic Transaction

provides encryption for credit card numbers that can be transmitted over the Internet

30
Q

PGP

A

Pretty Good Privacy

A freeware email encryption system. Introduced in the 1990s used widely for email security

272

31
Q

HTTPS vs S-HTTP

A

HTTPS is a secure channel

S-HTTP is a secure message
274

32
Q

FIPS

A

Federal Information Processing Standard

A set of guidelines for US federal government information systems

33
Q

CPS

A

Certificate Practice Statement

Discuss standards of how certificates are issued, what measures are taken to protect certificates, and the rules that CA users must follow to maintain their certificate eligibility

34
Q

Hierarchical Trust Models

A

AKA a tree

A root CA at the top provides all of the information. The intermediate CAs