Cryptography Flashcards
Cross-certification
used to establish trust between different PKIs and build an overall PKI hierarchy.
Cross certification allows users to validate each other’s certificate when they are certified under different certification hierarchies.
Cross certification does not check the authenticity of the certificates in the certification path.
certification path validation
check the authenticity of the certificates in the certification path
What are the three main issues with key management?
key recovery, key storage, and key change
Which key should you use to ensure confidentiality of an e-mail message?
the receiver’s public key
What are the three purposes of ElGamal?
digital signatures, encryption of data, and key exchange
What does a digital signature provide?
non-repudiation for e-mail
Which security standard sets security standards for hardware and software cryptographic modules?
FIPS-140
To which type of attack is the Diffie-Hellman algorithm susceptible?
man-in-the-middle attacks
What is contained within an X.509 CRL?
a list of serial numbers of unexpired or revoked digital certificates that should be considered invalid
AES - MixColums
provides diffusion by mixing the columns of the state via finite field mathematics.
AES - SubRows
provides diffusion by shifting rows (row of blocks) of the state.
AES - SubBytes
provides confusion by substituting the bytes of the state.
AES - AddRoundKey
is the final function applied in each round. It XORs the state with the subkey.
Electronic Code Book (ECB)
- is the simplest and weakest form of DES.
- Block mode
- It uses no initialization vector or chaining.
- Each block is encrypted independently.
- Two plaintexts with partial identical portions (such as the header of a letter) encrypted with the same key will have partial identical ciphertext portions.
- Used in small amount of data such as ATM PINS.
Cipher Feedback (CFB)
- a stream mode (usually 8-bits). The first 8 bits that come from the algorithm are then XORed with the first 8 bits of the plaintext (the first segment).
- Each 8-bit segment is then transmitted to the receiver and also fed back into the shift register.
- It uses feedback (the name for chaining when used in stream modes) to destroy patterns.
- Like CBC, CFB uses an initialization vector and destroys patterns, and errors propagate.
Cipher Block Chaining (CBC)
- a block mode that XORs the previous encrypted block of ciphertext to the next block of plaintext to be encrypted.
- The first encrypted block is an initialization vector.
- This “chaining” the result of encrypting one block of data is fed back into the process to encrypt the next block of data.
- This “chaining” destroys patterns and encryption errors will propagate
Output Feedback (OFB)
- A stream mode of DES that uses portions of the key for feedback.
- errors will not propagate.
- This does pose some storage complications, especially if it were to be used in a high-speed link.
Counter (CTR) mode
- a counter—a 64-bit random data block—is used as the first IV for feedback.
- every subsequent block, the counter is incremented by
- The counter is then encrypted just as in OFB, and the result is used as a keystream and XORed with the plaintext.
Because the keystream is independent from the message, it is possible to process several blocks of data at the same time, thus speeding up the throughput of the algorithm. - used in high-speed applications such as IPSec and ATM.
principal
any entity that possesses a public key
verifier
an entity that verifies a public key chain.
subject
an entity that seeks to have a certificate validated.
Trust anchor
is a public key that verifies the certificate used in a digital signature.
Symmetric algorithms
DES, 3DES, IDEA, Blowfish, Twofish, RC4, RC5, RC6, Advanced Encryption Standard (AES), SAFER, and Serpent
Asymmetric algorithms
Diffie-Hellman, RSA, ElGamal, Elliptic Curve Cryptosystem (ECC), LUC, Knapsack, and Zero