03. Cryptography (299) Flashcards
(41 cards)
Cryptography
- Cryptography is the practice of hiding information in plain sight.
- Encryption is the application of cryptography that converts data into code
299
Cryptography
Original, unencrypted message or file
300
PLAINTEXT
Cryptography
A message or file that has been transformed by encryption algorithm
300
CIPHERTEXT
Cryptography
Process of transforming plaintext into ciphertext
300
ENCRYPTION
Cryptography
Cyptographic operation on a block of data that returns a fixed-length string of characters.
Verifies the integrity of a message
301
HASH FUNCTION
Cryptography
The output from a cryptographic hash function
301
MESSAGE DIGEST
Cryptography
The result of encrypting the hash of a message with the originators private encryption key
Used to prove authenticity and integrity of a message
301
DIGITAL SIGNATURE
Cryptography
Mathematical formula used to perform encryption, decryptiong, message digests, and digital signatures
302
ALGORITHM
Cryptography
Process of transforming ciphertext into plaintext
302
DECRYPTION
Cryptography
An attack on a cryptosystem where the attack is attempting to determine the encryptiong key used to encrypt messages
302
CRYPTANALYSIS
Cryptography
Block of characters used with an encryption algorithm to encrypt and decrypt a block of data
302
ENCRYPTION KEY
Cryptography
An encryption key used to encrypt another encryption key
302
KEY-ENCRYPTING KEY
Cryptography
The size of an encryption key measured in bits
302
ENCRYPTION LENGTH
Cryptography
An encryption algorithm that operates on blocks of data
302
BLOCK CIPHER
Cryptography
A type of encryption algorithm that operates on a continuous stream of data i.e. video stream
302
STREAM CIPHER
Cryptography
Random number required by some encryption algorithms to being the encryptiong process
302
INITIALIZATION VECTOR (IV)
Cryptography
A method of encryption and decryption where sender and received must posess the same encryption key
302
SYMMETRIC ENCRYPTION
Cryptography
A use of public key and private key to encrypt and decrypt messages and digital signatures
ASYMMETRIC ENCRYPTION
aka
PUBLIC KEY CRYPTOGRAPHY
Cryptography
A technique used by two parties to establish a symmetric encryptiong key when there is no secure channel available
KEY EXCHANGE
Cryptography
The property of encryption and digital signatures that make it difficult/impossible for a sender to deny having sent a digitally signed message
NON-REPUDIATION
Private Key Cryptosystem
- Based on symmetric cryptographic algorithm
- Neccessary for both parties to possess a common encryption key
- 2 main challenges associated with this cryptosystem;
Key Exchange
Requires an out of band method i.e. telephone, fax, any means that is not over the same media you are transmitting message on
Scalability
Each sender-receiver pair exchange an encryption key
Communities of 1000+ users would require thousands of keys
303
Private Key Algorithms
- Advanced Encryptiong Standard (AES)
- Blowfish
- Data Encryption Standard (DES)
- Triple DES
- Serpent
- Twofish
303
Secure Key Exchange
- Secure Key Exchange - method used by 2 parties to establish a symmetric encryption key securely without transmitting the key over a channel
- Algorithms used for secure key exchange utilize information known by each parties but not transmitted between them
Example
* 2 routers using encryption on routing protocols will both have the key in their configurtaion so both ends known the key
303
Secure Key Exchange
The most popular secure key exchange algorithm is Diffie-Hellman key exchange protocol
303