Cryptography & PKI Flashcards
(109 cards)
Define Cipher Text
Text that has been encrypted for confidentiallity
Define Plain Text
Readable text for human comprehension
Define Symmetric Encryption
Encryption using a shared secret key, typically used for bulk encryption
Define Asymmetric Encrytpion
Encryption using a key pair consisting of a private and a public key
Goals of Cryptology
Confidentiality
Integrity
Authentication
Non-Repudiation
Define a Code
Substitutes one word or phrase for another
Define a Cipher
A mathematical algorithm for encryption
Types of Ciphers
Stream verses Block
Substitution verses Transposition
Define a Stream Cipher
Encrypts a single character at a time
Define a Block Cipher
Encrypts a chunk of text at a time
Define a Substitution Cipher
Encrypts by changing individual characters
Define a Transposition Cipher
Encrypts by scrambling letters
Define XOR
Exclusive Or;
True when only one input of two or more are true
Explain the Confusion Principle
Hide connection between cipher and key, can be used in stream and block ciphers
Explain the Diffusion Principle
Any change in input creates 50% or greater change in output
Explain the Obfuscation Principle
Action taken to make something unclear, unintelligible, or obscure
One-Time Pad Criteria
2 identical pads
Equal length
Single Use
Explain Security through Obscurity
Security reliant upon secrecy,
Generally disparaged
5 Stages of NIST Crypto Lifecycle
Initiation Develop and Acquire Implement and Assess Operate and Maintain Sunset; stop, destroy, or archive
DES Key Facts
Symmetric
64 bit blocks
56 bit key
Insecure
3DES Key Facts
Symmetric 64 bit blocks 168 bit key (112 effective key length) Secure utilizing 3 separate keys Used in IPsec
AES Key Facts
Symmetric 128 bit blocks 128, 192, or 256 bit key Secure Uses Rijndael block Cipher
Blowfish Key Facts
Symmetric
64 bit blocks
32-448 bit key
Secure (at larger key sizes)
Twofish Key Facts
Symmetric
128 bit block
128, 192, or 256 bit key
Secure (more complex and faster then Blowfish)