2.8 Summarize the basics of cryptographic concepts Flashcards
Summarize DIGITAL SIGNATURES
PKI systems incorporate digital signatures to authenticate the source of a message. Digital signatures essentially hash the data to show integrity and non-repudiation.
Summarize KEY LENGTH
This refers to the number of bits in the key; the longer the key, the more secure or harder time for the hacker to try and break the key. Although, with the improvements in computing power today, longer keys don’t always guarantee a stronger key.
Summarize KEY STRETCHING
Key stretching hash the password more than once and some key stretching functions can even hash a single password more than 10,000 times to derive the password.
Two popular key derivation functions are: PBKDF2(faster) and bcrypt(stronger).
Summarize SALTING
A salt is an arbitrary value, usually created by the application or operating system storing passwords and these salts are added to the end of a password before it is hashed. It makes the password stronger and it will stop a rainbow table attack.
Summarize HASHING
Hashing provides integrity in the CIA triad of security by creating unique numbers for data and originators of information. Hashing helps verify that data came from a specific source.
Summarize KEY EXCHANGE
Key exchange refers to the process used to exchange keys between users who send a message and those who receive it.
Summarize ELLIPTIC-CURVE CRYPTOGRAPHY(ECC)
ECC is an asymmetric method of cryptography based on problems involving the algebraic structure of elliptic curves over finite fields. ECC is useful in low-power devices like phones, for example.
Summarize PERFECT FORWARD SECRECY
It means to protect a cryptosystem from one key giving away some secret that makes it easier to crack. It kind of means to use a key once and throw it away.
Summarize QUANTUM COMMUNICATIONS
Quantum communications has established connections between quantum computers over fiber-optic lines that regularly transact business using quantum key distribution(QKD).
Summarize QUANTUM COMPUTING
This theorizes that these quantum computers can easily crack most modern cryptosystems, like RSA and Diffie-Hellman.
Summarize POST-QUANTUM
This speculates cryptographic algorithms that can withstand any attack using quantum computers. It’ll be years though before we can create this kind of stuff that take cryptography to the next level.
Summarize EPHEMERAL
An ephemeral key is a temporary key that is used in only one exchange and then discarded.
Summarize AUTHENTICATED MODE OF OPERATION
Authenticated modes of operation are the most common way because they authenticate and encrypt messages.
Summarize UNAUTHENTICATED MODE OF OPERATION
In an unauthenticated mode of operation, the message is still encrypted, but an attacker can use an attack called a chosen ciphertext attack to intercept, modify, and, eventually decrypt messages. This is bad.
Summarize COUNTER MODE OF OPERATION
In DES, counter(CTR) mode uses a random 64-bit block as the first IV, then increments a specified number or counter for every subsequent block of plaintext. CTR mode offers the best performance.
AES uses Galois/Counter Mode(GCM) which is counter mode, but adds a special data type known as a Galois field to add integrity.