Chapter 1 Flashcards
Fundamentals Recap
What is used to encrypt individual files?
Aescrypt
What is used to encrypt full disks?
Bitlocker or FileVault
What is One-time pad?
is considered to be unbreakable since it only uses its cipher code once.
PRNG (Pseudo-Random Number Generator)
This method repeats random numbers after a given time. They are fast and are also deterministic and are useful in producing a repeatable set of random numbers.
Frequency Analysis
is a cipher cracking methodology that involves identifying patterns and variations in the probability of codes.
Entropy
relates to the degree of uncertainty of the encryption process.
Hardware and Software encryption
Hardware encryption is more efficient than software encryption.
HSM (Hardware Security Module)
is a tamper-evident and intrusion resistant physical device that safeguards and manages cryptographic keys and provides cryptographic processing.
TPM Trusted Platform Module
is a dedicated processor that handles hardware-level encryption; allows the use of full disk encryption on a hard drive in a manner that minimizes the impact on system performance. TPM contains the encryption keys.
Enigma Machine
Used a polyalphabetic substitution cipher, which did not repeat within a reasonable time period, along with a secret key. For the cracking of the Enigma cipher, the challenge was thus to determine both the algorithm and secret key.
Combinations
not concerned with the order
Permutations
all options considered including sequence
Diffie-Hellman
key exchange algorithm used to exchange the secret key in symmetric cryptography
Common block cipher modes
ECB, CBC, CFB, OFB, and CTR.
CFB, OFB, and CTR allow the block cipher to operate like a stream cipher.
CFB, OFB, and CTR allow the block cipher to operate like a stream cipher.
Hashing
describes One-Way or irreversible encryption used for protecting the integrity of data.
Hashing involves
taking a VARIABLE length input and producing a FIXED length output (message digest)
Similar context/ Pre-image attack
Part of the message has some significance to the original and generates the same hash signature.
2 Main applications of Public Key
Identity checking and key protection
RSA
has a heavy overhead on processor loading and is not well suited to embedded systens
Bitcoin
uses ECC (Elliptic Curve cryptography) with a 32-byte private keys and 64 byte public keys.
El Gamal
is a public key method that is used in both encryption and digital signing.