NIS Chapter 03 Flashcards
(46 cards)
what is an unbounded medium?
a communication medium which has no inherent physical limitations.
define cipher
a process that converts plain text into a ciphertext
what are symmetric algorithms? Give three examples of such
WEP, TKIP, CCMP
A key is shared between both encrypting and decrypting party
Why is it important to have a secure way of sharing the key?
since the key is shared, the key needs to be kept secret otherwise there is no point to the encryption
What is asymmetric encryption ?
a type of encryption method that has a private key and a public key. One for encryption and one for decryption
what technique does a stream cipher use?
plaintext is encrypted bit by bit
what is a keystream?
This is a psuedorandom cipher bit stream that is combined with the plaintext
What is WEP encryption?
- a type of stream cipher
- that uses the RC4 stream cipher to generate a keystream
- and uses xor to combine the plain text and generated stream
What is a block cipher?
- ## takes in a fixed size length of data and encrypts it to the same length
Is block ciphering a symmetric or asymmetric ciphering scheme?
symmetric
What is the downside of putting a specific block through multiple iterations of encryption in order to increase security?
performance will be affected
What are the 2 parts of the RC4 cipher?
The PRG and KSA
How do the 2 parts of the RC4 work together? (4)
- a key is ran through the KS
- Which produces a state vector
- state vector is fed into the PRG which permutes/rearranges the vector
- XOR the resultant with the plaintext
What was the general use case of the RC4 cipher?
weak hardware/lazy developers
Is RC4 a stream cipher / block cipher?
stream
What makes RC5 different from RC4? (2)
- variable block, variable and #rounds
- block cipher instead of stream
Why is the Data Encryption Standard considered insecure>
- small key size
4 facts about DES
- block cipher
- 64 key size
- 56 effective lenght
- 16 rounds on each block
what is the difference between DES and 3DES
it is essentially DES run 3 different times using 3 keys
What are the different key options for 3DES
- all keys are the same, all keys are unique, 2 keys are unique
3 facts of AES
- supports 3 key sizes
- used as a security standard
What 3 encryption methods operate in the 2 layer of the OSI model?
CCMP, TKIP, WEP
What is the structure of 802.11 data frames?
-
What is the payload of an 802.11 data frame reffered to as?
a MSDU