Cryptography (CRY) Flashcards

(120 cards)

1
Q

Algorithm

A

mathematical function that determines the cryptographic operations

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Asymmetric

A

encryption system using a pair of mathematically related unequal keys

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Asymmetric Cryptography

A

Sender and receiver have public and private keys.
Public to encrypt a message, private to decrypt
Slower than symmetric, secret key (100 to 1000)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Asynchronous

A

encrypt/decrypt request are processed in queues.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Birthday attack

A

statistical probabilities of a collision are more likely than one thinks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Black Boxing

A

manipulates toll-free line voltage to phone for free

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Block Cipher

A

Segregating plaintext into blocks and applying identical encryption algorithm and key

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Blowfish

A

By Bruce Schneider key lengths 32 to 448 bits, used on Linux systems that use bcrypt (DES alternative)
Confidentiality Symmetric, Algorithm

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Blue Boxing

A

tone simulation that mimics telephone co. system and allows long distance call authorization

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Brute Force

A

with enough computing power trying all possible combinations

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Caesar cipher

A

mono-alphabetic substitution cipher

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

CBC Cipher Block Chaining

A

blocks of 64 bits with 64bits initialization vector. Errors will propagate

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Certificate Authority

A

PKI, entity trusted by one or more users as an authority in a network that issues, revokes, and manages digital certificates.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Certificate revocation list (CRL)

A

a temporary public file to inform others of a compromised digital certificate

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Certification authority

A

a trusted issuer of digital certificates

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

CFB

A

Cipher Feedback: stream cipher where the cipher text is used as feedback into key generation. errors will propagate

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Checksum

A

a mathematical tool for verifying no unintentional changes have been made

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Cipher

A

cryptographically transformation that operates on characters or bits. DES, word scramble, shift letters

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Cipher text

A

scrambled form of the message or data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Clustering

A

situation wherein plain text messages generates identical cipher text messages using the same algorithm but with different crypto-variables or keys

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Code

A

substitution at the word or phrase level

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

Codes

A

cryptographic transformation that operates at the level of words or phrases. Example: “wedding” means “attack”

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

Collisions

A

outputs within a given function are the same result

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

Concatenation

A

joining two pieces of text -

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Confidentiality Asymmetric Algorithms
RSA (Rivest, Shamir, Adelman) - Factoring large primes Elliptic Curve Cryptosystem - Logs, discrete logs Diffie-Hellman for key exchange El Gamal
26
Confidentiality Asymmetric Strengths
Confidentiality Authentication Non-repudiation Key management easier Access control Integrity
27
Confidentiality Asymmetric Weaknesses
More processor-intensive than symmetric encryption Still need to protect private key
28
Confidentiality Symmetric Algorithms
AES (Extended AES, Rijndael) RC4 DES - Brute force can break it, but not flawed. Types Lucifer, Feistle Cipher, Triple DES.
29
Confidentiality Symmetric Strengths
Confidentiality protection Speed Bulk encryption - large files efficiency Availability of free algorithms
30
Confidentiality Symmetric Weaknesses
Key management Scalability issues Shared keys - No authentication or non-repudiation, Forgery by receiver is possible
31
Confusion
mixing the key values during repeated rounds of encryption, make the relationship between ciphertext and key as complex as possible relationship between the plaintext and the key is so complicated that an attacker can't merely continue altering the plaintext and analyzing the resulting ciphertext to determine the key
32
Cross certification
two certificate authorities that trust each other
33
Cryptanalysis
code breaking, practice of defeating the protective properties of cryptography.
34
Cryptographic Algorithm
Step by step procedure to encipher plaintext and decipher cipher text
35
Cryptography
code making
36
Cryptography Goals
Confidentiality Integrity Proof of origin Non-repudiation Protect data at rest Protect data in transit
37
Cryptology
The study of cryptography and cryptanalysis We think about Confidentiality, Integrity, and key exchange
38
Cryptology - CRY
cryptography + cryptanalysis
39
Cryptology implementation
IPSec TLS
40
Cryptosystem
set of transformations from a message space to cipher space
41
Cryptovariable
key
42
CTR
Counter: secure long messages
43
Decipher
descrambling the encrypted message with the corresponding key
44
Dictionary attack
try a list of words in passwords or encryption keys
45
Diffie Hellman Key exchange
switching secret keys over an insecure medium without exposing the keys Not encryption Technically - Large prime generation, Groups
46
Diffusion
mix location of plaintext throughout ciphertext, change of a single bit should drastically change hash, dissipate pattern a change in the plaintext results in multiple changes spread throughout the ciphertext
47
Digital certificate
a electronic attestation of identity by a certificate authority
48
Digital Signature
Asymmetric encryption of a hash of message
49
DSA
Digital Signature Algorithm – the US Government Equivalent of the RSA algorithm
50
Dumpster Diving
going through someone’s trash to find useful or confidential info –it is legal but unethical in nature
51
ECB
Electronic Code Book - right block/left block pairing 1-1. Replication occurs. Secure short messages. One of the Block modes of symmetric ciphers
52
ECC
Elliptic Curve Cryptosystem: mathematical properties of elliptical curves, IT REQUIRES FEWER RESOURCES THAN RSA. Used in low power systems (mobile phones etc.)
53
el Gamal
Works with discrete logarithms, based on Diffie Hellman
54
Encipher
act of scrambling the cleartext message by using a key.
55
End-to-end encryption
Encrypted information that is sent from point of origin to destination. In symmetric encryption this means both having the same identical key for the session
56
Ephemeral keys
cryptographic keys that are generated for each execution of a key establishment process. SYN-Session Key
57
Exclusive OR
Boolean operation that performs binary addition
58
Hash function
one way encryption, for integrity purposes
59
Hybrid Cryptography
z-Uses both asymmetrical and symmetrical encryption: asymmetrical for key exchange symmetrical for the bulk - thus it is fast example: SSL, PGP, IPSEC S/MIME
60
IDEA
International Data Encryption Algorithm 64 bit plaintext and 128 key length with confusion and diffusion used in PGP software patented requires licenses fees/free noncom.
61
Information Theory
Claude Elmwood Shannon
62
Integrity - How do we know about change?
Hash functions Checksums - Accidental Message Authentication Code
63
Initialization Vector
randomly-generated value used by many cryptosystems to ensure that a unique ciphertext is generated
64
Kerckhoff's principle
only the key protects the encrypted information
65
Key clustering
two different keys decrypt the same cipher text
66
Key escrow
for PKI, to store another copy of a key
67
Key Length
use with each algorithm based on the sensitivity of information transmitted, longer key the better!
68
Key management
creation distribution update and deletion
69
Key or Crypto variable
Information or sequence that controls the enciphering and deciphering of messages
70
Key space
total number of keys available that may be selected by the user of a cryptosystem
71
Keyed-Hashing for Message Authentication
a hash that has been further encrypted with a symmetric algorithm
72
Link encryption
stacked encryption using different keys to encrypt each time
73
Man-in-the-middle attack
adversary intercepts encrypted communications, decrypts, views, encrypts, and send along to the true destination
74
Message Authentication Code
Integrity intentional changes
75
Message digest
summary of a communication for the purpose of integrity
76
Message digest size for hash functions
Hash of Variable Length HAVAL 128, 160, 192, 224, 256 bits Hash message authentication code HMAC Variable Message Digest MD5 128 bits Secure Hash Algorithm SHA-1 160 bits SHA2-224/SHA3-224 SHA2-256/SHA3-256 SHA2-384/SHA3-384 SHA2-512/SHA3-512 RIPE Message Digest RIPEMD-128 RIPEMD-160 RIPEMD-256 (security equivalent to 128) RIPEMD-320 (security equivalent to 160)
77
Moore's Law
computing power will double every 18 months
78
multi-party control
for PKI, to have more than one person in charge of a sensitive function
79
Non-repudiation
impossibility of denying authenticity and identity
80
Null Cipher
used in cases where the use of encryption is not necessary but yet the fact that no encryption is needed must be configured in order for the system to work. Ex. Testing, stenography
81
OFB
Output Feedback: stream cipher that generates the key but XOR-ing the plaintext with a key stream. No errors will propagate
82
One time pad
a running key using a random key that is never used again Use a different substitution alphabet for each letter of the plaintext message. AKA: Vernam cipher
83
Permutation /transposition
Moving letters around
84
PGP
GPG; encrypt attached files
85
Phreakers
hackers who commit crimes against phone companies
86
Plain text
natural or human-readable form of message
87
Plaintext
message in clear text readable form
88
Polyalphabetic
using many alphabets
89
Public Key Infrastructure (PKI)
collection of business processes and technologies used for binding individuals to a digital certificate
90
Rainbow Tables
a list of hash values, presorted to speed lookup. typically for cracking password hashes. It is a form of time-memory tradeoff, using less CPU at the cost of more storage. A control to reduce this type of attack is salting.
91
RC5
Variable algorithm up 0 to 2048 bits key size
92
Red boxing
Pay phones cracking
93
Registration Authority
performs certificate registration services on behalf of a CA. RA verifies user credentials
94
Revocation
for PKI, decertify an entities certificate
95
Rijndael Block Cipher Algorithm
for speed, simplicity and resistance against known attacks. Variable block length and variable key lengths (128,192 and 256 bits)
96
Rivest Cipher 5
RC5: symmetric algorithm patented by Rivest, Shamir, and Adleman (RSA) Data Security, the people who developed the RSA asymmetric algorithm. RC5 is a block cipher of variable block sizes (32, 64, or 128 bits) that uses key sizes between 0 (zero) length and 2,040 bits.
97
RSA
Rivest, Shamir, & Adleman: works with one way math with large prime numbers (aka trap door functions). Can be used for encryption, key exchange and digital signatures)
98
Running key
an encryption method that has a key as long as the message
99
Script kiddie
Someone with moderate hacking skills, gets code from the Internet.
100
Shift cipher (Caesar)
moving the alphabet intact a certain number spaces
101
Side channel attack
inference about encrypted communications
102
SP-network
process described by Claude Shannon used in most block ciphers to increase their strength
103
Steganography
hiding the fact that communication has occurred
104
Stream cipher
operate on one character or bit of a message (or data stream0 at a time. Examples: Caesar cipher, one-time pad
105
Substitution
trading one for another use the encryption algorithm to replace each character or bit of the plaintext message with a different character
106
Symmetric
encryption system using shared key/private key/single key/secret key
107
Symmetric Cryptography
Both the receiver and the sender share a common secret key. Larger key size is safer > 128 Can be time-stamped (to counter replay attacks) Does not provide mechanisms for authentication and non-repudiation
108
Symmetric encryption memorization chart
Advanced Encryption Standard (AES), block size 128, key size 128, 192, 256 Rijndael, block size Variable, key size 128, 192, 256 Blowfish (often used in SSH), block size 64, key size 32-448 Data Encryption Standard (DES), block size 64, key size 56 IDEA (used in PGP), block size 64, key size 128 Rivest Cipher 4 (RC4), block size N/A (stream cipher), key size 40-2048 Rivest Cipher 5 (RC5), block size 32, 64, 128, key size 0-2040 Rivest Cipher 6 (RC6), block size 128, key size 128, 192, 256 Skipjack, block size 64, key size 80 Triple DES (3DES), block size 64, key size 112 or 168 CAST-128, block size 64, key size 40-128 CAST-256, block size 128, key size 128, 160, 192, 224, 256 Twofish, block size 128, key size 1-256
109
Synchronous
each encryption or decryption request is performed immediately
110
Transposition/permutation
process of reordering plaintext to hide the message rambo = ombar
111
Two fish
Key lengths 256 bits blocks of 128 in 16rounds BEAT OUT BY Rijndal for AES, based on Blowfish
112
Vernam
cipher (one time pad): key of a random set of non- repeating characters
113
Vigenere
polyalphabetic substitution
114
Watermarking
intellectual property management technique for identifying after distribution
115
White box
dual tone, multifrequency generator to control phone system
116
Work factor
effort/time needed to overcome a protective measure
117
If you want to encrypt a confidential message
Use the recipient's public key
118
If you want to decrypt a confidential message sent to you
Use your private key
119
If you want to digitally sign a message you are sending to someone else
Use your private key
120
If you want to verify the signature on a message sent by someone else
Use the sender's public key