Module 13: Cryptography in Network Security Flashcards

(20 cards)

1
Q

Requirements that cryptography can fulfill

A

Authentication
Privacy
Integrity (message unaltered)
Non-repudiation (message received)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Secret-key (symmetric) cryptography

A

Encryption and decryption use the same key. Usually faster/more efficient for encrypting.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Public-key (asymmetric) cryptography

A

Different keys used for encryption and decryption. Can scale more easily.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

4 main components in cryptography for any “practical systems”

A

Cryptosystems (algorithms)
Modes (how algorithms initialized and used to manage messages longer than one block)
Protocols (how algorithms composed and applied to real problems)
Key management (creating, distributing, storing, updating keys)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Common key length

A

128-bit for symmetric algorithms, 1024 bits for asymmetric algorithms

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

MIC (Message Integrity Code)

A

Cryptographic checksum, used to confirm data in file has not been maliciously changed

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Block cipher algorithm

A

Takes fixed-length block of plaintext, encrypts to a fixed-length block of cipher text. Cons: repetitions are noticed. Solution: CBC (Cipher block chaining)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Stream cipher algorithm

A

Uses key to make pseudorandom key stream, XOR-ed with plaintext to make ciphertext. Con: simple cipher algorithm makes same key stream with each new messsage (solution: use Initialization Vector and key)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

DES (Data Encryption Standard) (private-key)

A

Block cipher algorithm

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Triple DES (private-key)

A

Uses three 56-bit DES keys to encrypt each block

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Blowfish (private-key)

A

Cipher block algorithm, uses variable key lengths

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

AES (Advanced Encryption Standard) (private-key)

A

Attempt to replace DES

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What does public key do for authentication?

A

Digital signature applied to message using private keys

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

How does public key solve security of key directory?

A

Public-key certificates. CA (certificate authorities) organized in a hierarchy.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

RSA (named after creators) algorithm

A

best known public-key cryptosystem.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Mode of operation

A

Method of combining executions of cipher algorithms, for when message is longer than block length of the cipher.

17
Q

ECB (Electronic Codebook) Mode

A

Encryption algorithm applied independently to each block of message. Cons: same input block always encrypted as same ciphertext block, attacker can substitute blocks to alter part of a message

18
Q

CBC (Cipher Block Chaining) Mode

A

Each plaintext block XOR-ed with preceding ciphertext block. “bootstrapped” with Initialization Vector (IV)

19
Q

Protocol

A

Series of steps take to accomplish a task. Used to refer to attainment of user-visible results such as secret communication and digital signatures.

20
Q

Two methods for generating keys

A

User input
Pseudorandom