1B Flashcards
The practice of ___ ensures messages, be it voice or data, are transmitted and received by only the intended parties.
encryption
___ is a Cybersecurity discipline identified in AFI 17-130 Cybersecurity Program Management with the purpose of implementing appropriate measures to protect all Air Force Information System (IS) resources and sensitive or classified information.
COMSEC
COMSEC is a Cybersecurity discipline identified in ____ Cybersecurity Program Management with the purpose of implementing appropriate measures to protect all Air Force Information System (IS) resources and sensitive or classified information.
AFI 17-130
This ___ leads the U.S. Government in cryptology that encompasses both signals intelligence (SIGINT) and cybersecurity.
The National Security Agency/Central Security Service (NSA/CSS)
The NSA ranks cryptographic products or algorithms by a certification called…?
product types
Each Type Product requires a Type Key at the appropriate level to encrypt the information. The ___ defines the Type 1, 2, 3, and 4 products.
CNSSI No. 4009 National Information Assurance Glossary
Which type key is the following describing?
For encrypting and decrypting classified and sensitive national security information.
Type 1
Which type key is the following describing?
For encrypting or decrypting sensitive national security information.
Type 2
Which type key is the following describing?
For encrypting or decrypting unclassified sensitive U.S. Government or commercial information, and to protect systems requiring protection mechanisms consistent with standard commercial practices.
Type 3
Which type key is the following describing?
For unevaluated commercial cryptographic equipment that are neither NSA nor NIST certified for any Government usage. These products may contain either vendor proprietary algorithms, algorithms registered by NIST, or algorithms registered by NIST and published in a Federal Information Processing Standard (FIPS).
Type 4
Classifications of encryption-device types are further broken down into two releasable categories:
Suite A and Suite B
Which classification of encryption-type devices is the following describing?
(Confidential through Top Secret) A specific set of classified cryptographic algorithms used for the protection of some categories of restricted mission critical information.
Suite A
Which classification of encryption-type devices is the following describing?
(Confidential through Secret) A specific set of cryptographic algorithms suitable for protecting both classified and unclassified national security systems and information throughout the US government and to support interoperability with allies and coalition partners.
Suite B
This is the art and science of making and breaking codes and ciphers.
Cryptography
Those who try to “break” a cryptosystem are practicing…?
cryptanalysis
___ is the process of converting information to a disguised form in order to send it across a potentially unsafe channel.
Encryption
___ is the reverse process, providing a means of revealing the information.
Decryption
In cryptographic terminology, ___ is the un-encoded or unsecure message;
plaintext
In cryptographic terminology, ___ is the encrypted message.
cipher text
Encryption and decryption methods make use of a key and a coding algorithm, aka…?
scheme
Modern encryption schemes utilize the concepts of…?
symmetric-keys
public-keys (asymmetric keys)
Which scheme is the following describing?
The encryption and decryption keys are the same. Communicating parties must have the same key in order to achieve secure communication.
Symmetric-keys
Which scheme is the following describing?
The encryption key is published for anyone to use and encrypt messages. However, only the receiving party has access to the decryption key that enables messages to be read.
Public-Keys (asymmetric keys)
The need to keep data secure has been around since people started passing messages and wanted to keep it a secret from others. While many iterations have come along and later been deemed obsolete, one of the standard’s most used today is the symmetric-key algorithm ___, also known as “___”.
Advanced Encryption Standard (AES)
Rijndael
The U.S. Government adopted this standard in 2001, moving away from the former Data Encryption Standard (DES) and Triple Data Encryption Standard (3DES).
Advanced Encryption Standard (AES)
While DES and 3DES would cypher using 56-bit encryption, AES proved to be a much-needed upgrade, providing encryption using three different key lengths:
128, 192, and 256 bits.
Confidential and Secret information requires AES of ___ key lengths or higher.
128-bit