Chap_3_part-1 Flashcards

1
Q

what is Cryptography?

A

the use of mathematical operations to protect messages traveling between parties or stored on a computer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Cipher?

A

specific mathematical process used in encryption and decryption.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

key?

A

random string of ones and zeros (bits)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

cryptanalysis?

A

a person that analyses encryption and cracks it. Brute-force key cracking: using a dictionary to try all possible keys is one way.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

confidentiality means?

A

ppl who intercept messages can not read them.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

what is cipher text?

A

messages (plain-text) that has been encrypted into seemingly 1’s and 0’s to traverse the network to destination.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

what is Substitution Cipher/ how does it work?

A

one character (plain text) is substituted for another but remains in the same letter position. so: now = + key= rwl

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

what is Transposition Cipher/ how does it work?

A

letters (real world = bits) are moved around in plain text message but they are not substituted like they are in Substitution Ciphers. (a grid system is used from the key to create and select each letter and the order they are put into).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

difference between Ciphers and Codes?

A

Ciphers move position of plain text around or use substitution with numbers to encrypt the message. both sides have a key.
Codes: use Code Symbols that represent complete words/ phrases. code books are needed, no need for computer. several codes can be used to represent one word. codes can be broken from reception of messages but ciphers can not because a key is needed, the message intercepted is a random bit.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Symmetric Key Encryption?

A

a single key is used for encryption and decryption in both directions. (small computation power needed.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

key length- each additional bit adds how much time to take to crack the key (password)?

A

each bit doubles the time needed. mathematical formula is… 2 to the (x) exponent. x =’s the number of bits/letters in the key/password. example: 2 to the 8th exponent = 256 possible keys. usually it can be guessed correctly in the 1st half of keys tried so. 2 to the 8th divided by 2 = 128 tries to break key on average.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

what length in key characters is = to a ‘strong’ symmetric key?

A

100 bits or longer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

what is block encryption with DES (Data Encryption Standard)?

A

64 bits of plain text are encrypted at a time. weaker encryption and uses a 56 bit key with 8 redundant bits.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

what is Security through Obscurity?

A

the concept that a not well understood private symmetric key encryption program is more secure because it is less known. this is not good practice because the software used to create the cipher may not be good and if cracked/ back door is found would be a big security breach.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Cryptographic system?

A

a set of cryptographic countermeasures for protecting dialogues. aka: all communications between computers are encrypted and a handshake is performed before info is sent. often used by military and businesses .

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

cipher suite is what?

A

specific set of options for a particular cryptographic standard.; specific methods for authentication, key exchange, ongoing message confidentiality and integrity.

17
Q

cryptographic system standards are what?

A

standards tell which types of protections and which mathematical formulations will be used to provide security: like; SSL/TLS and IPSEC

18
Q

what are the 3 stages of the cryptographic system Handshake negotiation?

A

1- negotiation of cryptographic methods/ parameters and options to be used (cipher suite)
2- initial authentication: (proving you re who you say you are to one another) usually done by both parties unless logging into a server.
3 - Keying: ciphers need keys so they send their key info to other computer once authenticated.

19
Q

what type of securities are used once a cryptographic system gets to the ongoing communication stage to protect communications?

A

-electronic signature is added to each communication
each message is authenticated one at a time,
- message integrity is used so that if a message is altered it gets rejected by receiver
- the message and electronic signature are encrypted for confidentiality.

20
Q

who/what is Supplicant?

A

the party that is prove its identity when authentication portion of a cipher suite handshake is taking place. the Verify-er accepts or rejects the Credentials proving identity.

21
Q

how many hashes does MD5 make?

A

128 bit hashes, should not be used as it is weak.

22
Q

describe how hashing works…

A

a string of bits (a number) is divided by a Hash number and the answer is the Hash. the final hash number is much smaller then the orig. number and the process to get this number can be repeated if the process is completed with the same exact starting number of bits. the final hash number can not be reversed though. **used when authenticating users passwords.