Cryptology Flashcards

1
Q

2 Different protocols for IPSec

A
  1. Authentication Header(AH) ? provides authentication

2. Encapsulating Security Payload(ESP) ? whole suite of security

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Advanced Encrption Standard (AES)

A

Uses Rijndael Block Cipher. Incorporates variable block cipher and key lengths. Uses a key size of 128.192, or 256. Approved by government

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Asymmetric key algorithms

A
  1. Diffie?Helman ? requires key agreement
  2. El Gamal ? Functions on the encryption and digital signature. Often operates slowly.
  3. Elliptic Curve Cryptosystem(ECC) ? Often difficult to implement but capable to functioning with limited resources such as power and bandwidth.
  4. Merkle?Hellman Knapsack ? Applying weights to each set of items where the total defines the items in the knapsack. Used w/ trapdoors to one?way functions.
  5. RSA ? Functions on the encryption, digital signature, and key exchange.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Asymmetric Key Cryptography

A

A method of encoding information that uses 2 keys and a one?way function. Public key encrypts, private key decrypts. can perform authenticatoin and non?repudiation. a/k/a public key cryptography

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Block Cipher

A

An encryption method that breaks the message into blocks of data bits. Each block is encoded.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Blowfish

A

Block cipher with block lengths, encrypted thru 16 X of 64 bits and key lengths up to 448 bits.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Ceaser Cipher

A

Common form of substitution. Moves each letter 3 places forward in relation to its number.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Characteristics of a message hash

A
  1. Set length signature is created from variable length input.
  2. Slight change in orginal creates great difference in result signatures.
  3. Chances of 2 differing input values produce the same output signatures are low.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Clipper Chip

A

An encryption chip for digital voice communications that automatically encrypts and decrpyts.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Concealment Cipher

A

A predetermined key or groups of words used to decode a message, such as reading only every fourth word.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Cryptanalysis

A

Breaking or cracking the code and deciphering the data without authorization

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Cryptosystem

A

A system for encoding and deciphering data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Data Encryption Standard (DES)

A

56 bit cipher key for symmetric key encryption. Remaining 8 bits are used for parity, performed through 16 rounds. Susceptible to brute force attacks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Decipher

A

To decode the data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Differential Cryptanalysis

A

Compares two plain text data sets suring encryption to determine probably keys. Often used against block ciphers.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Digital Signature

A

Validates identity of sender. approved by NIST via SHS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Encipher

A

To code the data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Factoring

A

Attempting to determine the prime factors of the keys.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

International Data Encryption Algorithm (IDEA)

A

Block cipher with block lengths of 64 bits divided into 16 bit units and encrypted 8 X. key lengths of 128 bits

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Key Escrow

A

Form of symmetric key cryptography used by law enforcement. Third party agency maintains the key.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Keyspace

A

The group of numbers used to create a key.

22
Q

Linear Cryptanalysis

A

Compares known plain text and ciphertext to determine probably keys

23
Q

Man?in?the?middle

A

Intercepting messages between the sender and receiver

24
Q

Meet?in?the?middle

A

Compares known plaintext and keys to intercepted encrypted text.

25
Message Digest(Message Hash)
Cryptographic data that verifies the contents of a message that has not been altered.
26
Name 4 Email Security Methods
1. Pretty Good Privacy(PGP) ? uses PGP keys only 2. Privacy Enhanced Mail(PEM) ? can use various keys 3. Multipurpose Internet Mail Extension(MIME) ? good choice for internal and standalone. No inherent security measures 4. Secure/MIME(SMIME)
27
Name 5 Internet Security Methods
1. Internet Security Protocol(IPSec) ? server to server, remote access, network protection. 2. Secure Electronic Transaction(SET) ? transmitting credit card data 3. Secure Hypertext Transport Protocol(SHTTP) ? Protects single pages 4. Secure Shell(SSH?2) ? remote access over the network. 5. Secure Socket Layer(SSL) ? client to server authentication (HTTPS)
28
Name some Message Digest Formats
Message Digest 5 (MD5) Secure Hash Algorithm(SHA) Hashed Message Authentication Code (HMAC)
29
Name the 3 modes of 3DES
1. DES?EDE2 ? Encrypt with one key, decrypts with another, encrypts with the first key again. 2. DES?EEE2 ? Encrypts with one key, encrypts with a 2nd key, encrypts with the first key 3. DES?EEE3 ? Encrypts with one key, encrypts with a 2nd key, encrypts with a 3rd key.
30
Name the 4 modes of DES
1. Cipher Block Chaining(CBC) ? Most common. XORs an initialization block. 2. Cipher feedback(CF) ? uses stream cipher 3. Electronic Code Book(ECB) ? Uses Block ciphering 4. Output Feedback(OF) ? Easy to break, XORs plain text
31
Non?repudiation
Ensuring that the message sender is tracked and stored as having sent the message.
32
Open Message
Encrypts message with private key, provides authentication only.
33
Polyalphabetic Cipher
Uses multiple alphabets to encode data. (i.e. vigenere cipher)
34
Public Key Infrastructure(PKI)
Keys are created on the PC. Designed to address remote users and their data transmissions. common for e?commerce.
35
RC5
Block cipher with variable block and key lengths and as well as encryption iterations
36
RC6
Block cipher based on RC5. Uses a min. 128 block size and 2 working registers to comply with AES
37
Rijndael Block Ciper
Uses both variable block and key lengths determined by the implementation. The lengths can be either 128,192, or 256.
38
Running Key Cipher
Using some predetermined set of actions taken to decode a message.
39
Secure Message
Encrypts the message with public key, provides confidentiality only.
40
Signed and Secure Message
Encrypts the message with private key and then with public key, provides authentication and confidentiality
41
Steganography
Photographs or other digitial media used to hide messages.
42
Stream Cipher
An ecryption method that breaks the message into a stream of single bits. Each bit is encoded. Slow method
43
Substitution
A method of encoding data that uses the alphabet and each letter's associated numbers. Predetermined pattern.
44
Symmetric Key Cryptography
A method of encoding data that uses a single key. Used by both sender and receiver. Good to use with large amounts of data and is faster than Asymmetric
45
Transposition
A method of encoding data that scrambles the letters of the message. a/k/a ? Permutation
46
Triple DES (3DES)
Uses 112 bit cipher key for symmetric key encryption. Encrypts message 3 times.
47
Twofish
Block cipher with 128 bit block lengths, encrypted 16 X and key lengths up to 256 bits.
48
What are the 4 primary goals of cryptography?
Confidentiality, Integrity, Authentication, and non?repudiation.
49
What is the difference between keyed and non?keyed message digests?
Keyed ? original message combined with a secret key. (MACs) | Non?Keyed ? original message hashed without any other mechanisms(MICs and MDCs)
50
Work Factor
Estimated amount of work it would take to break the code.