1b - Crypto Principles IAW SCLA HO Flashcards
The objective of ___ is to ensure the employment of measures and controls taken to deny unauthorized personnel information derived from ISs of the United States Government related to national security and to ensure the authenticity of such ISs.
COMSEC
The ____ leads the U.S. Government in cryptology that encompasses both signals intelligence (SIGINT) and cybersecurity.
National Security Agency/Central Security Service (NSA/CSS)
Nowadays, all military encryption is standardized by
the ___ guidance.
NSA
For encrypting and decrypting classified and sensitive national security information.
Type 1
For encrypting or decrypting sensitive national security information.
Type 2
For encrypting or decrypting unclassified sensitive U.S. Government or commercial information, and to protect systems requiring protection mechanisms consistent with standard commercial practices.
Type 3
For unevaluated commercial cryptographic equipment that are neither NSA nor NIST certified for any Government usage. These products may contain either vendor proprietary algorithms, algorithms registered by NIST, or algorithms registered by NIST and published in a Federal Information Processing Standard (FIPS).
Type 4
(Confidential through Top Secret) A specific set of classified cryptographic algorithms used for the protection of some categories of restricted mission critical information.
Suite A
(Confidential through Secret) A specific set of cryptographic algorithms suitable for protecting both classified and unclassified national security systems and information throughout the US government and to support interoperability with allies and coalition partners.
Suite B
Making a code or cipher system is called ____.
cryptography
Those who try to “break” a cryptosystem are practicing ____.
cryptanalysis
___ is the process of converting information to a disguised form in order to send it across a potentially unsafe channel.
Encryption
The un-encoded or unsecure message.
plaintext
The encrypted message.
cipher text
In ____, the encryption and decryption keys are the same. Communicating parties must have the same key in order to achieve secure communication.
Symmetric key