Cryptography (CRY) Flashcards
(120 cards)
Algorithm
mathematical function that determines the cryptographic operations
Asymmetric
encryption system using a pair of mathematically related unequal keys
Asymmetric Cryptography
Sender and receiver have public and private keys.
Public to encrypt a message, private to decrypt
Slower than symmetric, secret key (100 to 1000)
Asynchronous
encrypt/decrypt request are processed in queues.
Birthday attack
statistical probabilities of a collision are more likely than one thinks
Black Boxing
manipulates toll-free line voltage to phone for free
Block Cipher
Segregating plaintext into blocks and applying identical encryption algorithm and key
Blowfish
By Bruce Schneider key lengths 32 to 448 bits, used on Linux systems that use bcrypt (DES alternative)
Confidentiality Symmetric, Algorithm
Blue Boxing
tone simulation that mimics telephone co. system and allows long distance call authorization
Brute Force
with enough computing power trying all possible combinations
Caesar cipher
mono-alphabetic substitution cipher
CBC Cipher Block Chaining
blocks of 64 bits with 64bits initialization vector. Errors will propagate
Certificate Authority
PKI, entity trusted by one or more users as an authority in a network that issues, revokes, and manages digital certificates.
Certificate revocation list (CRL)
a temporary public file to inform others of a compromised digital certificate
Certification authority
a trusted issuer of digital certificates
CFB
Cipher Feedback: stream cipher where the cipher text is used as feedback into key generation. errors will propagate
Checksum
a mathematical tool for verifying no unintentional changes have been made
Cipher
cryptographically transformation that operates on characters or bits. DES, word scramble, shift letters
Cipher text
scrambled form of the message or data
Clustering
situation wherein plain text messages generates identical cipher text messages using the same algorithm but with different crypto-variables or keys
Code
substitution at the word or phrase level
Codes
cryptographic transformation that operates at the level of words or phrases. Example: “wedding” means “attack”
Collisions
outputs within a given function are the same result
Concatenation
joining two pieces of text -