Ch2 Cryptography Flashcards
how does an Exclusive OR algorithm work?
a key is applied at the bit level, and if the values are different (true-false or false-true) the output is true, otherwise false
what is Kerckhoff’s principle?
you can determine the algorithm of an encryption, but without the key you will still not be able to decrypt it
what are the 3 locations data can be encrypted?
storage media (data in place); data in transit (while being sent); data in process (in active memory)
why is binary XOR encryption sometimes not sufficient obfuscation?
patterns will still emerge in the encrypted data
in symmetric encryption the key can be shared _______ (with the message) or ________ separately
in band; out of band
symmetric encryption can be very secure if the key is _____
ephemeral (temporary)
sometimes ______ encryption is used to send the key for symmetric encryption
asymmetric
the _____ encryption algorithm was developed by IBM
Data Encryption Standard (DES)
the __________ was developed through an encryption conference in the 90’s, and has been adopted by the US government
Advanced Encryption Standard (AES)
in ___________, rather than encrypting chunks, pseudo=random bits are encrypted one at a time
streaming ciphers
in ___ encryption prime numbers are multiplied in order to create key pairs
RSA
in a _______ exchange, the parties to a communication add their private key to a public key using modular arithmetic
Diffie-Hellman
in ____ encryption, a random key is used to encrypt the data, then that key is encrypted using a public key
PGP
the purpose of Hashing is..
to verify the integrity of data
when the Hashes of two different data sources turns out to be the same, this is called a:
collision