Security Plus - Chapter 7 Flashcards
(90 cards)
Cryptography
The practice of encoding information in a manner that it cannot be decoded without access to the required decryption key.
Encryption
Transforming plain text information into cyphertext using an encryption key.
Decryption
Transforming cyphertext into plain text using a decryption key.
Goals of Cryptography
- Confidentiality - Encryption is used to protect sensitive information from persons that do not have the need to have the information.
- Integrity - Ensures that data is not maliciously or unintentionally altered
- Authentication - Validating the identity of an individual
- Non-repudiation - Ensures that individuals can prove to a third-party that a message came from its purported sender.
Cipher
A method used to scramble or obfuscate characters to hide their value.
Algorithms used to perform encryption and decryption operations of secret messages.
Substitution
A type of coding or cypher system that changes one character or symbol into a different one.
- Caesar cipher - used by Julius Caesar
- ROT13 - Means you rotate the characters 13 positions to decipher the original message.
- Polyalphabetic - Using multiple substitution alphabets for the same message. - Vigenere cipher - Used a keyword to look up the cipher text in a table to decipher the message.
Transposition Cipher
Involves transposing or scrambling the letters in a certain manner to hide the value of the message.
Columnar Transposition
Choose the number of rows in advance, which is the encryption key, then write the message by placing successive characters in the next row until you get to the bottom of the column.
The Enigma Machine
German government during World War II produced to provide secure communications between military and political units. Similar to a typewriter, the encryption code could be updated as needed based on the days encryption algorithm. The machine was based on polyalphabetic substitution which changed the substitution for each character of the message.
Stenography
The art of using cryptographic techniques to embed secret messages within another file. Alterations are made to the least significant bits of the many bits that make up image files.
Confidentiality
Ensures that data remains private in three different situations: when it is at rest, when it is in transit, and when it is in use.
Types of cryptosystems that enforce confidentiality:
- Symmetric cryptosystems - Use a shared key available to all users of the cryptosystem
- Asymmetric cryptosystems - Use individual combinations of public and private keys for each user of the system.
Obfuscation
The practice of making it intentionally difficult to for humans to understand how code works.
Encrypting Data at Rest
Encrypt data on disk - Data stored directly on a disk may be managed with full-disk encryption, partition encryption, file encryption, and volume encryption.
Full-Disk Encryption
A form of encryption where all the data on a hard drive is automatically encrypted, including the operating system and system files.
Partition Encryption
Targets a specific partition of a hard drive to encrypt.
File-Level Encryption
This allows users to encrypt specific files on a hard drive which allows for easier setup and management.
Volume Encryption
Encrypting a set “volume” on a storage device, which may contain several folders and files.
Database Encryption
A method used to protect sensitive information stored in a database from access by unauthorized users.
- Transparent data encryption (TDE) - Encrypts the entire database
- Column-level encryption (CLE) - Allows for specific columns within a table to be encrypted.
Record level encryption - Allows for individual records within a database to be encrypted.
Integrity
Ensures that data is not altered without authorization.
Message Integrity
Encrypting messages through the use of message digest or digital signatures, which are validated by the recipient of the message, ensuring the message was not altered during transit.
Authentication
Verifies the claimed identity of system users and is a major function of cryptosystems.
Non-repudiation
Assurance to the recipient that the message was originated by the sender and not someone masquerading as the sender. Prevents the sender from claiming they never sent the message initially.
Key Space
The range of values that are valid for use as a key for a specific algorithm. It is defined by its key length (the number of binary bits). The range of numbers between 0 and 2 to the nth power. o to 2 to the 128th is a 128-bit key.
Algorithm
A set of rules, usually mathematical, that dictates how enciphering and deciphering processes are to take place.