Chapter 9: Cryptography and Symmetric Key Algorithms Flashcards Preview

CISSP > Chapter 9: Cryptography and Symmetric Key Algorithms > Flashcards

Flashcards in Chapter 9: Cryptography and Symmetric Key Algorithms Deck (83):
1

What are the goals of cryptography?

Confidentiality, integrity, authentication, and nonrepudiation.

2

What is the purpose of confidentiality?

It insures that data remains private while at rest or in transit.

3

What is the purpose of integrity?

It ensures that data is not altered without authorization.

4

What is the purpose of authentication?

It verifies that the claimed identity of system users is accurate.

5

What is the purpose of nonrepudiation?

It provides assurance t the recipient that a message was actually originated by the sender and not by someone masquerading as them.

6

What is "key space"?

The range of values that are valid as a key for a specific algorithm.

7

What is the Kerchoff Principle?

The principle that a cryptographic system should be secure even if everything is known about the system except the key.

8

What is a private key cryptosystem?

One in which all participants use a shared secret key.

9

What is a public key cryptosystem?

Each participant has their own pair of keys.

10

What is a cryptovariable?

Another name for a key.

11

What is cryptography?

The art and practice of implementing secret codes and cyphers.

12

What does FIPS 140-2 define?

Hardware and software requirements for cryptographic modules that the government uses.

13

What defines hardware and software requirements for cryptographic modules for government use?

FIPS 140-2

14

What is boolean mathematics?

The definition of rules for bits and bytes that form the nervous system of a computer. AND, OR, NOT, XOR, etc.

15

What is a one way function?

A mathematical operation that easily produces output values for each possible combination of inputs, but makes it impossible to retrieve the input values.

16

What kind of function are all public key cryptosystems based on?

A one way function.

17

What is a nonce?

A random number that acts as a placeholder in mathematical functions. A "number used once".

18

What is a zero-knowledge proof?

A proof that shows that a party has a particular piece of information without revealing that piece of information.

19

What is split knowledge?

Separation of duties over two or more persons, such as giving n parts of a key to n people and requiring a certain number of them to work together to access an object.

20

What is a work function or work factor?

A measure of the effort or time required to circumvent a cryptographic system. It should be greater than the value of the asset to be effective.

21

What is a code?

A cryptographic system of symbols that represents words or phrases. Not usually intended to provide confidentiality. Example: the 10-system used by law enforcement.

22

What is a cipher?

Always intended to hide the meaning of a message. Generally alter or rearrange the bits of a message.

23

What is a transposition cipher?

An encryption algorithm that rearranges the leters of a plaintext message.

24

What is a substitution cipher?

An encryption algorithm that replaces each character of the plaintext with a different character.

25

What is a one-time pad?

A substitution cipher that uses a different substitution alphabet for each letter of the message.

26

What are the requirements for a one time pad?

It must be randomly generated
It must be physically protected against disclosure.
It must be used only once.
The key must be at least as long as the message.

27

What is a running key cipher?

An encryption key is chosen from something like a book beginning at a certain place in the text.

28

What is a block cipher?

A cipher that operates on a message in chunks, applying the algorithm to the entire chunk at once.

29

What is a stream cipher?

A cipher that operates on one character or bit of a message at a time.

30

Describe confusion and diffusion in cryptographic terms

Confusion occurs when the relationship betwen the plaintext and the key is so complicated that the attacker can't merely continue altering the plaintext and analyzing the resulting ciphertext to determine the key.

Diffusion occurs when a change in the plain text results in multiple changes spread throughout the ciphertext.

31

How do modern cryptosystems work?

they use computationally complex algorithms and long cryptanalytic keys.

32

How should you select key length?

With consideration to the procesing power available to your adversaries now and in the future. If you want something to stay secret for 20 years, it has to be proof against the computing power that could be brought to bear agsint it over the next 20 years.

33

What is a symmetric key algorithm?

One that relies on a shared secret encryption key that all members of the communication must have.

34

What are the weaknesses of symmetric key algorithms?

Key distribution
No nonrepudiation
It's not scalable unless each pair of users has their own shared key (and that's ugly)
Keys have to be regenerated if any member of the group leaves

35

What is an asymmetric key algorithm?

AKA public key. Everyone has a public key, which can be publicly known, and a private key.

36

What are the strengths of asymmetric key algorithms?

Adding a user requires only generating one new public/private pair
It's easy to remove a user (key revocation)
Key regeneration is only required if someone's private key is compromised
Provides for integrity, authentication, and non-repudiation
Key distribution is easy
No need for preexisting communcation links.

37

What is the major weakness of public key crypto?

It's slow.

38

How do you overcome the major weakness of public key crypto?

Use public key crypto to set up symmetric crypto, then do the heavy lifting with that.

39

What is a hashing algorithm?

A one way function that provides a difficult to forge signature

40

What are common hashing algorithms?

MD2, MD5, SHA-0, SHA-1, SHA-2, HMAC

41

What is the block size of DES?

64 bits

42

What is the key size of DES?

56 bits

43

What are the five modes of operation of DES?

Electronic Code Book (ECB)
Cipher Block Chaining (CBC)
Cipher Feedback (CFB)
Output Feedback (OFB)
Counter (CTR)

44

What is Electronic Code Book

Each block is simply encrypted with the key.

45

What is Cipher Block Chaining?

Each block of unencrypted text is XORed with the block of ciphertext preceding it before encryption. This mode propagates errors.

46

What is Cipher Feedback mode?

The streaming version of Cipher Block Chaining.

47

What is Output Feedback mode?

Instead of XORing with the prior encrypted text, we XOR with a seed value. Each subsequent block is XORed with the encrypted value of the prior seed. As a result, errors do not propagate.

48

What is Counter mode?

The seed value simply increments. Errors do not propagate.

49

What is Triple-DES?

An adapted version of DES that uses the same algorithm to produce a more secure encryption.

50

What is blowfish?

Developed by Bruce Schneier. 64-bit block cipher. Keys 32-448 bits. Faster than IDEA and DES. Free for public use.

51

What is Skipjack?

Approved for US government use by FPS 185. 64-bit block cipher. 80-bit key. Supports key escrow. Used in the Clipper and Capstone chips.

52

What is AES?

Advanced Encryption Standard. Rijndael. Key: 128, 192, or 256 bits. 128-bit key requires 10 rounds, 192-bit key requires 12, 256-bit requires 14.

53

What is the block size for AES?

128.

54

What are the four versions of 3DES?

DES-EEE3: simply encrypt the plaintext 3 times using three different keys
DES-EDE3: also uses three keys, but the second operation is a decrypt instead of encrypt
DES-EEE2: 3 encryption steps using 2 keys. The second and first encryption steps use the same key.
DES-EDE2: encrypt using K1, decrypt using K2, encrypt using K1.

55

What is IDEA?

International Data Encryption Algorithm.

64-bit block cipher
128-bit key, which is broken up into 52 16-bit keys

56

What is the key size for AES?

128, 192, or 256.

57

What is the block size for Rijndael?

Variable

58

What is the key size for Rijndael?

128, 192, or 256 (same as AES)

59

What is the block size for blowfish?

Variable.

60

What is the key size for blowfish?

1-448

61

What is the block size for DES?

64

62

What is the key size for DES?

56

63

What is the block size for IDEA?

64

64

What is the key size for IDEA?

128

65

What is IDEA used in?

PGP

66

What cipher is known for being used in PGP?

IDEA

67

What is the block size of RC2?

64

68

What is the key size for RC2?

128

69

What is the block size for RC4?

None, it's a stream cipher.

70

What is the key size for RC4?

128

71

What is the block size for RC5?

32, 64, 128

72

What is the key size for RC5?

0-2,048

73

What is the block size for Skipjack?

64

74

What is the key size for Skipjack?

80

75

What is the block size for Triple DES (3DES)?

64

76

What is the key size for Triple DES (3DES)?

112 or 168

77

What is the block size for Twofish?

128

78

What is the key size for Twofish?

1-256

79

Describe offline key distribution.

Most technically simple mechanisms. Risks: mail can be intercepted, phone calls can be tapped, papers containing keys can be thrown away or lost.

80

Descfibe public key encryption key management

Use public key exchange to set up an encrypted session, than share a symmetric encryption key over that protected, but slower, link.

81

What are the recommendations for storage and destruction of symmetric keys?

Never store a key on the same system where encrypted data resides
For sensitive keys, consider giving half the key to different individuals. (aka split knowledge)

82

What are the major approaches to key escrow?

Fair cryptosystem: Secret keys are broken into n pieces and given to n independent third parties who provide the pieces when court-ordered to do so.

Escrowed encryption standard: Provides the government with a technical means to decrypt ciphertext.

83

Describe the cryptographic life cycle.

1) Specify cryptographic algorithms acceptible for use in the oganization
2) Identify acceptable key lengths based on the sensitivity of the information
3) Enumerate secure transaction protocols that may be used