Week 2-Summarize the Basics of Cryptographic Concepts Flashcards
Is the set of all possible keys that can be used in an encryption algorithm. (i.e. 56-bits=2^56, 256-bits=2^256 and 512-bits=2^512).
Keyspace
Is the process of changing the values. Complex substitution functions are used to create___
Confusion
The process of transforming plaintext (i.e. unencrypted data) into cipher text (i.e. encrypted data) using an algorithm and a secret key.
*The goal of ___ is confidentiality
Encryption
Is a measure of ensuring the:
*Authenticity
*Integrity
*Non-repudiation
of a digital document or message
Digital Signature
___means that the use of the algorithm & key length is allowed, but the user must accept some risk (weakness)
Deprecated
Is a process converting input data of arbitrary length into a fixed-sized output.
Known as a __value, digest or fingerprint
Hashing
Term used in cryptography to refer to a secret value used as a key, seed or initialization vector in an encryption or decryption algorithm.
Is a critical component of a cryptographic system, as it is used to transform plaintext & data into cyphertext or to decrypt ciphertext back to plaintext, the strength and security of the depends on its lenth, randomness and secrecy
Cryptovariable
The process of changing the order, sending bits through multiple rounds of transpositon is used to create___
Diffusion
Malicious code embedded in advertising
Malvertising
Hiding method:
modifying color space of a PNG image
Purpose:
hiding malicious code within a banner ad
Hiding method:
Malicious steganography
Purpose:
Segano
Hiding method:
Data hiding in HTML comment tags of the HTTP 404 error page
Purpose:
Embedding command and control commands
Hiding method:
Malicious seganography
Purpose:
Teslacrypt
Common symmetric encryption algorithms
3DES
AES
Common Asymmetric encryption algorithms
RSA, ECC, Difie-Hellman
__uses the same cryptographic key to encrypt and decrypt data.
*it is computationally efficient and can process large blocks of data.
*The disadvantages are key distribution and scalability
Symmetric encryption
__uses a pair of mathematically related keys.
*a private key and a public key.
*requires a lot of processing power and is slower.
*More suited for small blocks of data.
*advantage is scalability
Asymmetric encryption
_used to prove integrity
_produces a unique one-way fixed length
_representation of data set know as a __ , digest, checksum or fingerprint
_digests are compared and if they are the same then there is assurance that the data has not been modified
hash
Hash common algorithms are:
MDx
SHAx
__is used to prove authenticity of the message and verify the sender’s identy.
*A _ is a message digest encrypted with the sender’s private key.
Digital Signature
_are the mechanism used to generate a private key and to associate a public key with a collection of components sufficient to authenticate the claimed owner.
*The certificate is issued by a trusted certification authority, a web of trust, or self-generated and self-signed.
*is a unique ID for users, devices, applications and services.
Digital certificate
The cryptographic component used to ensure confidentiality.
Encryption
The cryptographic component used to prove integrity.
Hashing
The cryptographic component used to prove authenticity.
Digital signature
The number of keys used in asymmetric encryption
Two (public and private)
The key that is used to create a digital signature
the senders Private Key.