Flashcards in Chapter 8 - Cryptography Deck (27):
How did Caesar cipher his text?
He shifted the letters 3 space to the right.
What is Substitution Ciphering?
Where each letter is substituted with another letter
What is Transposition Ciphering?
by changing the order of the group.
How does ROT13 ciphering work
By rotating the letter to the right 13 places
What is PKI?
Is intended to offer a means of providing security to messages and transaction on a grand scale.
Is a two-key, asymmetric with four main components: certificate authority (CA), registration authority (RA), RSA (the encryption algorithm) and digital certificates.
What is an organization that is responsible for issuing, revoking and distributing certificates.
Certificate Authority (CA)
What is the primary difference between and RA and an LRA?
LRA can be used to identify to establish the an individual. LRA involves the physical identification of the person requesting a certificate.
What is PKIX?
Public-Key Infrastructure X.509
What is PKCS?
Public-Key Cryptography Standards
What is X.509?
Defines the certificate formats and fields for public keys..
Also defines the procedure that should be used to distribute public keys.
What is X.509 v2 for?
CRL (Certificate Revocation List)
What is X.509 v3 for?
What are Symmetric Algorithms?
Require both ends of an encrypted message to have the same key and processing algorithm.
What is DES?
Data Encryption Standard
Has been used since the mid 70s.
It was the primary standard used in the government and industry until replaced by AES
What is AES?
Advanced Encryption Standard
RAS is named after who?
What are some Asymmetric Algorithms?
- Elliptic Curve (ECC)
What three characteristics must Hashing Algorithms have?
- It must be one-way
- Variable length input produces fixed length output
- The algorithm must have few or no collisions
What types of Hashing algorithms should you be familiar with?
- Secure Hash Algorithm (SHA)
- Message Digest Algorithm (MD)
- RACE Integrity Primitive Evaluation Message Digest (RIPEMD)
What is Key Stretching?
Refers to the process used to take a key that might be a nit weak and make it stronger, usually by making it longer.
What methods are there for Key Stretching?
- PBKDF2 (Password-Based Key Derivative Function 2)
What some common code breaking methods?
- Frequency Analysis
- Chosen Plaintext
- Related Key Attack
- Brute Force Attacks
- Exploiting Human Error
What are the three most important concepts in Security?
What is SET?
Secure Electronic Transaction
Provides encryption for credit card numbers that can be transmitted over the Internet. Visa and MasterCard developed it. SET is most suited fro transmitting small amounts of data.
WHat is SSH?
A tunneling protocol originally used on Unix systems. SSH can be used in place of the older Remote Shell (RSH) utility that used to be a standard in the Unix world. It can be used in place of rlogin and Telnet.
What file name extensions should be allowed?
- ,doc, .docx
- .xls, .xlsx