CH-8 Encryption Flashcards

1
Q

What is Cryptography?

A

–The practice and study of how to secure communications

–Constructing protocols that prevent unauthorized access –Requires mathematics

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

How does Single/symmetric key encryption work?

A

– One secret key used to encrypt and decrypt

– Uses Stream or Block Ciphers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

How does Public/asymmetric key encryption work?

A

– Two keys in a pair; one public and one private

– Public key is shared and used to encrypt – Private key is not shared; required for decryption

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is Key in Cryptography?

A

Key: Bits that are combined with plain text to encrypt it

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is Cipher tex in Cryptography?

A

Cipher text: The encrypted text

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is an Algorithm in Cryptography?

A

Algorithm: A mathematical process for doing something

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is shift cipher?

A

Caesar Cipher Uses a substitution alphabet Caesar is a mono alphabetic cipher Frequency distribution cracks this simple cipher

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is ATBASH

A

Reverses letters in the alphabets, so A becomes Z (substitution)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is Rail Fence?

A

Writing message on alternating lines, e.g. a zigzag (transposition)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is Vigenere?

A

Series of interwoven Caesar ciphers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is Enigma Encryption?

A

–Series of rotors, each representing different 26 char substitution ciphers –Rotors on corresponding machines needed to be lined up –Rotors were changed daily based on secret key lists distributed in advance

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is XOR?

A

XOR is a binary operation. Fun fact! XOR is the only reversible binary operation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

How does XOR work?

A
  1. First, convert plain text to ASCII 2. Then, convert ASCII to binary. XOR, or “exclusive or” operates on binary data. It returns true if both of its inputs are opposites (one false and one true), otherwise, it returns false. Input Output A B 0 0 0 1 0 1
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is Link Encryption?

A

Link encryption is an approach to communications security that encrypts and decrypts all network traffic at each network routing point until arrival at its final destination.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is End to End Encryption?

A

A technique in which communication traveling along a network is encrypted and decrypted at every stage, or node. It is used to prevent traffic analysis and avoid human error.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Link vs. End to End Encryption

A
17
Q

What is Blowfish Algorithm?

A

■ Created by Bruce Schneier in 1993
■Symmetric block cipher
■Works on “blocks” of letters
■Uses variable length key (32- 448 bits)
■Freeware

18
Q

What is Data Encryption Standard (DES)?

A

■Another symmetric key algorithm
■Divided into 64 bit blocks; then transposed (jumbled)
■Manipulated by 16 steps of encryption, using a 56 bit key
■Scrambled by a swapping algorithm
■Transposed one final time
■Limitation is its small key length
■3DES runs the algorithm three times with three different keys
– A good stopgap measure, but resource intensive

19
Q

What is Advanced Encryption Standard (AES)?

A

■AES was chosen by NIST to replace DES in 2001
■Block cipher that works on 128 bit blocks
■Supports key sizes of 128, 192, or 256 bits
■Now the most widely used symmetric key algorithm

20
Q

Why Key Size Matters?

A
21
Q

What do you know about Public Key (Asymmetric)?

A

■One major problem with symmetric key
encryption
–How do you transmit the symmetric key?
–The answer: public key encryption
■One key (public key) used to encrypt
■One key (private key) used to decrypt
■Distribute public key, but only holder of
private key can decrypt those messages

22
Q

What is Secure Shell (SSH)?

A

■Secure Shell (SSH) is a cryptographic network protocol
■usually used to securely connect to a remote server or a virtual machine

You would need to have SSH on the virtual server and the machine you are connecting from to run command lines in SSH.

Protects against spoofing attacks and modification of data in
communication

23
Q

What is SSL and TLS?

A

■Both are cryptographic network protocols
■Secure Sockets Layer (SSL) was designed in the 1990s to protect communication
between a web browser and server
■In a 1999 upgrade to SSL, it was renamed Transport Layer Security (TLS)
■While the protocol is still commonly called SSL, TLS is the modern, and much more
secure, protocol
■SSL provides:
–Server authentication
–Client authentication (optional)
–Encrypted communication

24
Q

What is SSL Certificate?

A

An SSL (Secure Sockets Layer) certificate is a digital certificate that authenticates the identity of a website and encrypts information sent to the server using SSL technology.

25
Q

What si Pretty Good Privacy (PGP)?

A

PGP generates a public key (to encrypt messages) and a private key (to decrypt messages)

OpenPGP is an e-mail encryption standard

GPG is an open-source implementation of OpenPGP

26
Q

Describe RSA Encryption

A
  • One of the oldest asymmetric algorithms (1977)
  • RSA keys are typically 1024 to 4096 bits long
  • No published methods to crack RSA if a large key is used
  • Relatively slow, but good for small blocks of data
  • Often used by PGP (Pretty Good Privacy) to encrypt and distribute symmetric keys
27
Q

Describe Warning signs of fraud for Fraudulent Encryption Services

A

Warning signs of fraud:
–Unbreakable
–Certified
–Inexperienced creators
–Secret algorithm

28
Q

What is Digital Signature?

A

A mathematical algorithm routinely used to validate the authenticity and integrity of a message.

How do digital signatures work?

  • Hash function
  • Public key cryptography (Asymmetric)

Digital signatures - electronic signature technologies - the most secure type available. Digital signatures use PKI certificates from a trusted Certificate Authority (CA) to ensure identity authentication and document integrity by encrypted binding of the signature to the document.

29
Q

What is Hash?

A

■ One way encryption algorithm

■ Cannot be decrypted (or unhashed

■ The output is the same number of characters regardless of input size

  • Great for verifying that files have not been tampered with
  • You may see downloads accompanied by a hash

After you download the file, you can ensure the hashes match

Popular hashes include MD5 and SHA

30
Q

What is a Rainbow Table?

A

A pre-computed table for caching the output of cryptographic hash functions, usually for cracking password hashes.

Tables are usually used in recovering a key derivation function up to a certain length consisting of a limited set of characters.

31
Q

What is Hash Salt?

A

■ Random bits added to further secure encryption or hashing
■ Most often encountered with hashing, to prevent Rainbow Table attacks
■ Salt is intermixed with the message that is to be hashed
■ Here’s an example

  1. Start with the password “Pass001”
  2. In binary, it is 01110000 01100001 01110011 01110011 00110000 00110000 00110001
  3. Then salt it with an additional bit every 4th bit
  4. Now its 0111100001 0110100011 0111100111 0111100111 0011100001 0011100001 0011100011
  5. Converting that binary back to text gives you “xZ7 �� #” (garbage)
32
Q

What is Steganography?

A

Steganography is the practice of hiding a secret message inside of (or even on top of) something that is not secret. …

It is a form of covert communication and can involve the use of any medium to hide messages.

It’s not a form of cryptography, because it doesn’t involve scrambling data or using a key.

33
Q

What are a few Historical Steganography Methods

A

■ The ancient Chinese wrapped notes in wax and swallowed them for transport
■ We already talked about how Rome used messengers with shaved heads
■ A 1518 book by Johannes Trithmeus described a technique where a message was hidden
by having each letter replaced with a word in a specific column of text
– Ave Maria cipher used by John Dee to communicate with Queen Elizabeth I
– Replaced each coded letter with a short sentence about Jesus in Latin

■ During WW2, the French sent messages on the backs of couriers using invisible ink
■ Microdots are images reduced to the size of a period “.” on innocuous documents
– These were said to be used by spies during the Cold War

34
Q

What is Cryptanalysis?

A

■ Searching for a way to decipher encrypted messages without the secret key
– Very difficult, takes a long time, and is often unsuccessful
■ Frequency Analysis
■ Known plain text
■ Chosen plain text
■ Cipher text only
■ Related Key

35
Q

What Is the Future of Encryption?

A
  • The Threat of Quantum Computing
  • Classical computing performance has grown exponentially (2, 4, 8, 16, etc.)

– Quantum is expected to be double exponential (4, 16, 256, 65,536…)

There is a flurry of activity to significantly strengthen algorithms
– Significantly longer keys
– NIST is evaluating radically new public key encryption algorithms

■ Hope may be found in Homomorphic Encryption
– Based on some of the same math as quantum computing
– Allows calculations on encrypted data without first decrypting it
– Doesn’t run on classical computers; it’s going to be a chicken and egg race!
■ Quantum Key Distribution and other novel ideas are also in the work s