Chapter 1 Flashcards
Fundamentals Recap
What is used to encrypt individual files?
Aescrypt
What is used to encrypt full disks?
Bitlocker or FileVault
What is One-time pad?
is considered to be unbreakable since it only uses its cipher code once.
PRNG (Pseudo-Random Number Generator)
This method repeats random numbers after a given time. They are fast and are also deterministic and are useful in producing a repeatable set of random numbers.
Frequency Analysis
is a cipher cracking methodology that involves identifying patterns and variations in the probability of codes.
Entropy
relates to the degree of uncertainty of the encryption process.
Hardware and Software encryption
Hardware encryption is more efficient than software encryption.
HSM (Hardware Security Module)
is a tamper-evident and intrusion resistant physical device that safeguards and manages cryptographic keys and provides cryptographic processing.
TPM Trusted Platform Module
is a dedicated processor that handles hardware-level encryption; allows the use of full disk encryption on a hard drive in a manner that minimizes the impact on system performance. TPM contains the encryption keys.
Enigma Machine
Used a polyalphabetic substitution cipher, which did not repeat within a reasonable time period, along with a secret key. For the cracking of the Enigma cipher, the challenge was thus to determine both the algorithm and secret key.
Combinations
not concerned with the order
Permutations
all options considered including sequence
Diffie-Hellman
key exchange algorithm used to exchange the secret key in symmetric cryptography
Common block cipher modes
ECB, CBC, CFB, OFB, and CTR.
CFB, OFB, and CTR allow the block cipher to operate like a stream cipher.
CFB, OFB, and CTR allow the block cipher to operate like a stream cipher.