Chapter Seven & Eight Flashcards

(44 cards)

1
Q

Cryptography

A

The study of securing information through the use of codes, ciphers, encryption, and other security techniques

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Cryptanalysis

A

The study of how ciphers, codes, and cryptosystems work
and why

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Cryptology

A

The combined study of cryptography and cryptanalysis

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Kerckoff’s Principle

A

he security of a cryptosystem should not rely on the secrecy of the system

We want to assume attackers have access to knowledge before deploying
attacks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Caesar Cipher

A

– Replace each letter in a text by the 3rd letter
following it in the alphabet:
– ABCD becomes DEFG; CAT becomes FDW
– Variations rotate by different amounts
– Monoalphabetic substitution cipher

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Vigenere Cipher

A

– Named after 16th century author Blaise
Vigenère
– Uses a series of different rotations
– The “key” may be a word – each letter
indicates a rotation
– Polyalphabetic substitution cipher

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

he Data Encryption Standard (DES) (1977)

A

– Developed by IBM and US government
– Adopted by banks to protect the earliest
electronic bank transactions
* Supported 56-bit keys: 256 different keys
– 72,057,594,037,927,900
* Over 72 quadrillion keys (7 x 1016)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q
  • AES
A

128-bit, 192-bit, and 256-bit keys
– Smallest key is still too large for DES Cracker
* 128-bit key would take 1019 years

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Key stream…

A

It is a stream of bits with these properties:
– Attackers can’t predict its contents in practice

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

The RC4 Stream Cipher (1987)

A

Rivest Cipher 4 (RSA)
* Prioritized speed of encryption without loss of
data in limited systems
* Byte cipher, doesn’t work at the bit-level
* Used in Microsoft End-to-End Encryption, PDF,
SSL, etc.
* Broken due to biases in the secret key

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Pseudo-Random Numbers And Key
Streams (PRGNs)

A

Statistically random numbers: good for
simulations, bad for cryptography

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Known Ciphertext

A

or ciphertext only
– All we know is the ciphertext
– Most difficult situation, most common

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Known Plaintext

A

– We know some plaintext to match some of the ciphertext encrypted with a particular key

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Chosen Plaintext

A

We can choose some plaintext to encipher
with our victim’s cipher, and retrieve the
ciphertext

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Computational foundations

A

All strong encryption algorithms are built on top of “mathematically
intractable” algorithms (prime factorization – finding the factors of
extremely large prime numbers, discrete logarithms, etc.)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Cryptonet

A

set of people or devices that all
share the same secret key – transitive trust

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Public and private keys…

A

– Public keys can be shared with attackers
– Private keys are kept secret by the owner

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Elliptic Curve Cryptography

A

Similar to Diffie-Hellman
– Can calculate a shared secret
– Uses elliptic curve computations:
(y2 = x2 + ax + b)(mod p)
Elliptic curve key is 2–3x larger than a secret
key yielding a comparable search space

19
Q

Quantum key distribution

A

-Applies Heisenberg’s Uncertainty Principle to detect eavesdropping
– Demonstrated using satellite communications

20
Q

Quantum cryptanalysis

A

– Schor’s algorithm factors very large numbers
– A large quantum computer could attack
current public-key crypto techniques

21
Q

Birthday attack:

A

comes from the birthday
paradox, where in
n group of people, two of
which are bound to have the same birthday

Randomly create two of the same file until the
same hash value is generated

22
Q

MAC

A

cryptographic checksum applied to a
message

23
Q

Keyed hash

A

– A way of verifying that some of our data has
not been modified by an attacker
– Keyed Hash – a value created from both the
message and the secret key to create a MAC
(Message Authentication Code)

24
Q

Digital signature

A

A hash of the message
encrypted with the private key of the sender
– Includes…
* Hashing algorithm used
* Contents of the message
* Key generation algorithm
* Any other information provided by a CA

25
Man-In-The-Middle Attack (MITM)
attack where any communication of the keys is intercepted and spoofed by the attacker – Forge messages from one party as legitimate without knowing the keys themselves; simply use them to create false messages
26
What is bit-flipping
It refers to a type of attack where an attacker modifies individual bits within a block of encrypted data in order to change its meaning or functionality. This attack is particularly effective against encryption schemes that use stream ciphers or block ciphers in certain modes of operation.
27
Volume
a logical space containing its own filesystem
28
a logical space containing its own filesystem
 Designed using loops or rounds  Implements key schedules for different keys  Feistel structure (AKA Feistel network)  Skeleton of most block ciphers  Drawbacks of block ciphers Can’t account for information outside of where information is encrypted
29
Social engineering
Deceptive or manipulative practices to gain information from someone (passwords, system configuration information, etc.)
30
RC4 was used in early wireless encryption (T/F)
True
31
Mode
is a technique for applying the cipher by mixing its outputs to hide ciphertext patterns
32
Cipher stream modes: (T/F) Both OFB and CTR can generate the keystream before the data is available to encrypt
True
33
Mode uses both XOR and the block cipher to construct the ciphertext stream (T/F)
True
34
35
Most modes are mixing modes that hide patterns... Typical modes?
Typical modes: – Electronic codebook (ECB) – no mixing at all – Output feedback (OFB) – creates a keystream – Counter (CTR) – creates a keystream – Cipher feedback (CFB) – blocks and streams – Cipher block chaining (CBC) – block oriented
36
Drawbacks of block ciphers
Can’t account for information outside of where information is encrypted
37
AESGCM, XTS modes
Modern solution incorporating intermediate authentication values (tag), advanced counter mode operations
38
AES GCM ( Advanced Encryption Standard in Galois Counter Mode)
Requires the use of a “tag” to authenticate certain vulnerable features about the message * Length of message, patterns in message/ciphertext/encryption algorithm vulnerabilities, etc
39
AEAD –
Authenticated Encryption with Additional Data
40
MS Windows – BitLocker feature
True
41
Apple OS X – FileVault feature
True
42
PGPDisk – part of commercial PGP crypto
True
43
Veracrypt – open-source FDE package
True
44
XTS is length-preserving
Does not incorporate padding or concatenation or reduction of encrypted data