Chapter 11: Cryptography Flashcards
US encryption export policy focuses on these three things
review of products before sale
streamlined post export reporting
license review of certain products to foreign governments
Cryptosystem
Disguises messages for all but the intended recipient
Cryptography
the craft of designing, building, and using cryptosystems
Cryptanalyisis
the craft of breaking a cryptosystem
Cryptology
the umbrella study of all cryptography
Transposition
Letters are rearranged
Substitution
Letters are swapped out
Plaintext
A message before running through a cryptosystem
Ciphertext
A message in it cryptographed form
Symmetric key cryptography
one key is used both to encrypt and decrypt
Example: Data Encryption Standard (DES)
3DES
128 bit key that is used to encrypt data three times (or “folds” the data); commonly used by banks at ATMs
Advanced Encryption Standard (AES)
Identification Friend or Foe (IFF) standard
Uses keys (that get changed out frequently) to decode “challenges” These challenges are sent with a preamble that warns that the encrypted message is coming. If the transponder cannot decrypt the challenge, it is then marked as “not a friend”
Asymmetric key encryption
Uses two keys, a public key that you share to anyone you want to send a message to, and a private key that you keep secret. The keys are mathematically related but not derived either one from the other. Public Key Infrastructures (PKI) are examples of this.
Public Private Key (PPK) allows for
Authentication:
Privacy:
Message integrity: