20 - Cryptography Flashcards
What is cryptography?
The conversion of data into a scrambled code that is encrypted and sent across a private or public network. Used to protect important data.
What are the types of cryptography?
- Symmetric: Uses the same key for encryption as it does for decryption
- Asymmetric: Uses different key for encryption and decryption.
What is Government Access to Keys (GAK)?
Where the software companies provide copies of all keys to the government so that they can hold onto them in a secure manner. LE agencies will use to monitor suspicious communication.
What is MD5?
Takes a message of arbitrary length as the input and then outputs a 128-bit fingerprint or message or message digest of the input. Not collision resistant. Use of latest algos such as SHA-2 and SHA-3 is recommended. Deployed for digital signatures, file integrity checking and storing passwords.
What is SHA (Secure Hashing Algorithm)?
An algorithm to generate cryptographically secure one-way hash, published by NIST. Produces a 160-bit digest from a message with a maximum length of (264-1) bits, and it resembles the MD5 algorithm. There are currently 3 generations:
- SHA-0: No longer used.
- SHA-1: Produces 160 bit digest from a message with a maximum length of (264-1) bits and resembles the MD5 algorithm.
- SHA-2: Family of 2 similar hash functions with different block sizes: SHA-256 (32 bits) and SHA-512 (64 bits)
- SHA-3: Uses Sponge Construction in which message blocks are XORed into the bits of the state which is then invertibly permuted.
What is RIPEMD-160 (RACE Integrity Primitives Evaluation Message Digest)?
A 160 bit hash algo in which the compression function consists of 80 stages made up of 5 blocks that execute 16 times each. Process repeats twice by combining the results at the bottom using modulo 32 addition.
What is HMAC (Hash-based Message Authentication Code)?
Type of message authentication code that makes use of cryptographic key with a combination of a cryptographic hash function. Includes embedded hash function such as SHA-1 or MD5. Includes 2 stages for computing the hash:
- Inputs inner key and message to produce an internal hash
- Inputs the output from the first stage and outer key and produces the final HMAC code.
What is PKI?
A set of hardware, software, people, policies, and procedures required to create, manage, distribute, use, store, and revoke digital signatures.
What are the components of PKI?
- Certificate Management System: Generates, distributes, stores, and verifies certs
- Digital Signatures: establishes creds of a person for online transactions
- Validation Authority (VA): Stores certs with their public keys
- Certificate Authority (CA): Trusted entities that issue and verify digital certs
- End User: Requests, manages, and uses certs
- Registration Authority (RA): Acts as the verifier for the CA
What are ciphers?
Algorithms used to encrypt or decrypt the data. Encipherment is the process of converting plain text into a cipher or code (reverse process is called decipherment).
What are different types of ciphers?
-
Classical: The most basic type which operate on alphabets.
- Substitution: User replaces units of plaintext with ciphertext.
- Transposition: Rearranging letters in the plain text according to a system.
-
Modern: Provides message secrecy, integrity, and authentication of the sender.Based on type of key used:
- Symmetric
- Asymmetric
-
Based on the type of input data:
- Block ciphers: Algorithm operating on block (group of bits) of fixed size with an unvarying transformation specified by a symmetric key. Most modern ciphers are block ciphers.
- Stream Ciphers: Symmetric key ciphers are plaintext digits combined with a key stream (pseudorandom cipher digit stream). The user applies the key to each bit, one at a time.
What is the Data Encryption Standard (DES)?
Designed to encipher and decipher blocks of data consisting of 64 bits under control of a 56-bit key. Due to inherent weakness of DES some organizations repeat the process 3 times for added strength (3DES).
What is Advanced Encryption Standard (AES)?
A symmetric-key algorithm that secures sensitive but unclassified material by US gov agencies. AES is an iterated block cipher which works by repeating the same operation multiple times.
What are the RC4, RC5, and RC6 algorithms?
- RC4: A variable key size symmetric stream cipher with byte-oriented operations and is based on the use of a random permutation
- RC5: Parameterized algorithm with a variable block size, variable key size, and a variable number of rounds. 128 bit key
-
RC6: Symmetric key block cipher derived from RC5 with two additional features:
- Uses integer multiplication
- Uses four 4-bit working registers
What is Twofish?
Uses a block size of 128 bits and key sizes up to 256 bits. It is a Feistal cipher that uses a single key for both encrypt and decrypt.