Cryptography Flashcards
FIPS
Federal information Processing Standard (FIPS)
approves cryptographic for use.
A possible key length for the Advanced Encryption Standard Rijndael cipher?
128, 192, or 256 bits
The Rijndael cipher allows users to select a key length of 128, 192, or 256 bits, depending on the specific security requirements of the application.
frequency analysis attack
The Caesar cipher
The Caesar cipher (and other simple substitution ciphers) are vulnerable to frequency analysis attacks that analyze the rate at which specific letters appear in the ciphertext.
Data Encryption Standard (DES) operating modes
Cipher Block Chaining (CBC)
Electronic Code Book (ECB) –> is not suitable for large amounts of data.
Cipher Feedback (CFB)
Output feedback (OFB) –> prevents early errors from interfering with future encryption/decryption.
Which AES finalist makes use of prewhitening and postwhitening techniques?
The Twofish algorithm, developed by Bruce Schneier, uses prewhitening and postwhitening.
the only known cryptosystem that is not vulnerable to attacks?
the one-time pad
block size is used by the 3DES encryption algorithm
3DES simply repeats the use of the DES algorithm three times. Therefore, it has the same block length as DES: 64 bits.
a key escrow system that requires multiple people to retrieve a key but does not depend on every participant being present
M of N Control requires that a minimum number of agents (M) out of the total number of agents (N) work together to perform high-security tasks.
Symmetric Cryptography
DES / 3DES Blowfish Skipjack Twofish AES
Uses a Shared Key that needs escrow.
Which key should I use?
To encrypt a message = recipients public key
To decrypt a message = your private key
To digitally sign a message = your private key
To verify a digital signature = senders public key
Email Security
Confidentiality = encrypt the message
To maintain integrity = hash the message
Email needs authentication, integrity and / or nonrepudiation = digitally sign the message
Email needs the kitchen sink = digitally sign + hash
Hashing vs Encryption
Encryption is the process of converting a normal readable message known as plaintext into a garbage message or not readable message known as Ciphertext. The ciphertext obtained from the encryption can easily be transformed into plaintext using the encryption key. Some of the examples of encryption algorithms are RSA, AES, and Blowfish.
Hashing is the process of converting the information into a key using a hash function. The original information cannot be retrieved from the hash key by any means. Generally, the hash keys are stored in the database and they are compared to check whether the original information matches or not.
IPSec components
Authentication Header (AH) = assurance of message integrity and nonrepudiation.
Encapsulating Security Payload (ESP) = provides confidentiality and integrity of packet contents.
IPSec Modes of Operation
Transport Mode = ony the packet payload is encrypted
Tunnel Mode = the entire packet, including header, is encrypted
Digital Signature Standard
Gov / NIST
FIPS 186-4
Federally approved algorithms must use the SHA-3 hashing functions.
DSA
RSA
Elliptic Curve
SHA-2
The Digital Signature Standard allows federal government use of the Digital Signature Algorithm, RSA, or the Elliptic Curve DSA in conjunction with the SHA-1 hashing function to produce secure digital signatures.
3 Major Public Key Cryptosystems
RSA
El-Gamal
Elliptic Curve
Which cryptographic algorithm forms the basis of the El Gamal cryptosystem?
A. RSA
B. Diffie-Hellman
C. 3DES
D. IDEA
The El Gamal cryptosystem extends the functionality of the Diffie-Hellman key exchange protocol to support the encryption and decryption of messages.
Which of the following cipher algorithms uses the longest key?
A. One-time pad cipher
B. Caesar cipher
C. Vigenère cipher
D. Columnar transposition cipher
The one-time pad uses a key that is equal in length to the message. All of the other algorithms use keys that are shorter than the message.
Cryptography Groups
Hashing = MD2, 4, 5 || SHA-1, 2…512
Asymmetric =
Symmetric
Block Ciphers
Flo and Ricky are sending messages to each other using an asymmetric encryption algorithm. Flo wants to send Ricky a private message. What key should she use to encrypt it?
A. Flo’s public key
B. Flo’s private key
C. Ricky’s public key
D. Ricky’s private key
Flo should encrypt the message with Ricky’s public key.
Bob received a message from David that was encrypted with an asymmetric algorithm. What key should he use to decrypt it?
A. Bob’s public key
B. Bob’s private key
C. David’s public key
D. David’s private key
B
The recipient of a message encrypted using asymmetric cryptography decrypts it with their own private key.
What type of attack can be used against cryptographic algorithms that do not incorporate temporal protections?
A. Chosen plain-text attack
B. Meet-in-the-middle attack
C. Man-in-the-middle attack
D. Replay attack
D
Richard received an encrypted message sent to him from Sue. Which key should he use to decrypt the message?
A. Richard’s public key
B. Richard’s private key
C. Sue’s public key
D. Sue’s private key
B
Sue would have encrypted the message using Richard’s public key. Therefore, Richard needs to use the complementary key in the key pair, his private key, to decrypt the message.
Richard wants to digitally sign a message he’s sending to Sue so that Sue can be sure the message came from him without modification while in transit. Which key should he use to encrypt the message digest?
A. Richard’s public key
B. Richard’s private key
C. Sue’s public key
D. Sue’s private key
B
Richard should encrypt the message digest with his own private key. When Sue receives the message, she will decrypt the digest with Richard’s public key and then compute the digest herself. If the two digests match, she can be assured that the message truly originated from Richard.