Chapter 3 - Encryption Flashcards

1
Q

What is CIA?

A

Confidentiality, Integrity, and Authentication, in the case of cryptography.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is a cipher?

A

A cipher is an algorithm that encrypts and decrypts.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

How can ciphers be public and still be secure?

A

Ciphers are only part of the actual encryption; a key is what actually allows the content (plaintext) to be read clearly from the ciphertext.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is a substitution cipher?

A

Pretty simple, where you substitute one letter (or bit) for another in each place.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is a transpostion cipher?

A

Transposition ciphers are simple as well, where the individual letters or bits are not changed, but change their orders.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

How are modern ciphers used?

A

Modern ciphers tend to use both substitution and transposition ciphers, repeatedly in mixed orders with different keys.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What’s the difference between a cipher and a code?

A

A cipher is the way of encoding messages, codes are where one thing is substituted for another thing (STOP = 26733). Generally, it means symbols are used in place of whole words.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is a weakness of a code? How is this avoided?

A

If a code uses the same substitution for a thing, it becomes easily recognizable. This can be avoided by having multiple things that can be substituted for one plaintext word.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

How does the length of key bits change the number of possible keys?

A

The more key bits, the larger the number of possible keys, exponentially.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What are the three stages of cryptographic systems?

A

The three stages of cryptographic systems are:

  • The two parties agree upon a system to use.
  • Handshaking stages go down.
  • Encrypted communication happens.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is a key?

A

A key is a random string of 40 to 40,000 bits.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

How do keys affect ciphers?

A

Any given cipher will produce different ciphertext from the same plaintext, based on the key used.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is Kerckhoff’s Law?

A

Kerckhoff’s Law states that the secret to secure encryption is to keep keys secret, not the cipher.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is cryptanalysis?

A

Cryptanalysis is the process of breaking encryption.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is confidentiality?

A

Confidentiality is when people who intercept messages cannot understand them.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is symmetric key encryption?

A

Symmetric key deciphering is where a cipher is encrypted and decrypted at both ends with the same key.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

What is the benefit of symmetric key encryption?

A

Symmetric key encryption is fast, and takes little in the way of resources, so it is well-suited for small transactions, mobile devices, etc.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

What is an exhaustive search?

A

An exhaustive search is an attempt to learn a key by trying all possible keys until the right one is found.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

How does increasing key length affect the time of an exhaustive search?

A

Each additional bit in a key doubles the time it takes to find the result.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Why is the word symmetric used in symmetric key encryption?

A

It is called “symmetric” key encryption because each side uses the same key to encrypt and decrypt.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

When two parties communicate with each other using symmetric key encryption, how many keys are used in total?

A

Symmetric key encryption uses a total of one key.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

What type of encryption cipher is almost always used in encryption for confidentiality?

A

Symmetric encryption is used in all but a tiny fraction of ciphers.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

What is the best way to thwart exhaustive searches by cryptanalysis?

A

The best way to thwart exhaustive (brute-force) searches is by increasing the key length of the key.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

If a key is 43 bits long, how much longer will it take to crack it by exhaustive search if it is extended to 45 bits?

A

It will take four times as long.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

If a key is 43 bits long, how much longer will it take to crack by exhaustive search if it is extended to 50 bits?

A

2^7th times as long.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

If a key is 40 bits long, how many keys must be tried, on average, to crack it?

A

2^40 attempts will be necessary (barring luck).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

How long must a symmetric encryption key be to be considered strong today?

A

Keys must be at least 100 bits long to be considered strong, and that is growing longer constantly as computers grow stronger.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

Why is cryptography not an automatic protection?

A

Cryptography can fail if one of the two parties isn’t vigilant, and cannot keep the key secure.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

What are the two advantages of RC4?

A

RC4 is extremely fast, and uses a small amount of RAM. It also can accept a wide array of key lengths.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q

Why is a common RC4 key length 40 bits?

A

RC4’s most common key length is 40 bits due to national export restrictions held by countries, requiring that encryption to not be so strong as that the nation importing the system couldn’t break it if needed.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
31
Q

How long is a DES key? Is this a strong length?

A

A DES key is actually 56 bits long, with an extra 8 bits of redundant padding, that can be computed provided you know the original 56 bits.This is far too short to be secure today.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
32
Q

Describe block encryption with DES.

A

DES encrypts blocks of 64 bits at a time into blocks of 64 bits of ciphertext.

33
Q

How does 3DES work?

A

3DES is a very slow, but secure, encryption method. It applies three different DES keys in a row to each block of bits, giving an effective key length of 168 bits (3 * 56).

34
Q

What are the two common effective key lengths in 3DES? Are these lengths strong enough for communication in corporations?

A

The two common key lengths in 3DES are 168 bits, and 112 bits. It is strong enough for corporate communication, but its dreadfully slow and therefore expensive.

35
Q

What is the big advantage of AES over 3DES?

A

AES hosts longer key lengths (128 bits, 192 bits, and 256 bits), and takes very little processing power, low enough it can be used on cell phones.

36
Q

What are the three key lengths offered by AES?

A

128 bits, 192 bits, and 256 bits.

37
Q

What does AES stand for?

A

Advanced Encryption Standard

38
Q

Which strong symmetric key encryption cipher can be used with mobile devices?

A

AES can be handled by mobile devices, and is very strong.

39
Q

Which symmetric key encryption cipher will probably dominate symmetric key encryption in the near future?

A

AES will likely dominate.

40
Q

What is “security through obscurity” and why is the premise flawed?

A

Security through obscurity refers to the idea that as long as the details of the cipher algorithm are unknown or not well-known, the cipher is secure. The problem is that all it takes is research to destroy it.

41
Q

Distinguish between cryptography and cryptographic systems.

A

Cryptography is a method of secure communications. Cryptographic systems are packaged sets of cryptographic countermeasures used to protect dialogues (back and forth).

42
Q

Distinguish between cryptographic systems and cryptographic system standards.

A

Cryptographic systems are sets of cryptographic countermeasures, whereas cryptographic system standards are standard protocols and methods.

43
Q

Why is the first handshaking stage the negotiation of security methods and options?

A

Negotiation of security methods and options is needed to begin because nearly all cryptographic systems offer multiple methods for communication.

44
Q

What is an impostor?

A

An impostor is a source of a message that pretends to be an authorized source.

45
Q

What is mutual authentication?

A

Mutual authentication occurs when both parties in a dialogue authenticate themselves.

46
Q

Why is a secure keying phrase necessary?

A

A secure keying phase is necessary, because there are a number of keying methods that are vulnerable to key stealing.

47
Q

What three protections do cryptographic systems provide on a message-by-message basis?

A

Electronic signatures, which allows the receiver to authenticate each message.
Message integrity authentication, which rejects the message if an attacker captures it and alters it.
Encryption, which, well, duh.

48
Q

What is an electronic signature?

A

An electronic signature is a method by which the receiver can authenticate each message.

49
Q

Distinguish between the handshaking stages and ongoing communication.

A

Handshaking stages occur at the beginning of a dialogue, and verify the cryptographic system that will be used. Ongoing communication is when messages are actually being exchanged, and message-by-message authentication occurs.

50
Q

In SSL/TSL, what is a cipher suite?

A

A cipher suite is a specific set of security methods and options for a particular cryptographic system standard.

51
Q

What is quantum key distribution?

A

Quantum key distribution delivers keys that are the length of the entire message, and is not susceptible to cryptanalysis.

52
Q

What are the two advantages of quantum key distribution?

A

The first advantage is that the message is not susceptible to cryptanalysis. The second advantage is that if the keying information is intercepted, the act of it being observed alters it, allowing for both parties to know it was intercepted, and discard the key.

53
Q

Why is quantum key cracking a major threat to many traditional cryptographic methods?

A

Quantum key cracking can attempt to use potentially thousands of keys at once, and is far, far more effective than any method to date.

54
Q

What is the definition of a VPN?

A

A VPN is a virtual private network, which is created by using a cryptographic system to secure communications over an untrusted network.

55
Q

Why do companies transmit over the internet? Or over untrusted wireless networks?

A

Using a VPN to transmit over the internet is staggeringly cheaper than attempting to build their own WAN.

56
Q

What are the three types of VPNs? What do they each do?

A

The three types of VPNs are as follows:
Host-to-Host VPN - Connects a single client to a single server. Things like online banking sites use this.
Remote Access VPN - Connects a single client to a secured internal network.
Site-to-Site VPN - Site-to-site VPN protects traffic flowing between two sites.

57
Q

What does a VPN gateway do for a remote access VPN?

A

A VPN gateway for a remote access VPN authenticates remote access users.

58
Q

What does a VPN gateway do for a site-to-site VPN?

A

A VPN gateway for a site-to-site VPN has two roles; the sending gateway encrypts, the receiving gateway encrypts.

59
Q

What is the difference between SSL and TSL?

A

There isn’t one, SSL was renamed to TSL by the Internet Engineering Task Force.

60
Q

What type of VPN was SSL/TSL designed for?

A

SSL/TSL was designed for a host-to-host VPN.

61
Q

What has SSL/TSL started to find use for?

A

SSL/TSL has started to find use as a remote host VPN standard.

62
Q

What layer does SSL/TSL operate on?

A

SSL/TSL operates on the transport layer.

63
Q

What types of applications can SSL/TSL protect?

A

SSL/TSL can only protect applications that are written to be SSL/TSL-aware, generally browsers, webservers, and e-mail programs.

64
Q

What are the two commonly used SSL/TSL applications?

A

The two most commonly used SSL/TSL applications are web browsers and webservers.

65
Q

Why is SSL/TSL popular?

A

Nearly every computer today has a web browser, which is already prepared to handle SSL/TSL, and it’s nearly completely free.

66
Q

SSL/TLS was created for host-to-host (browser–webserver) communication. What device can turn SSL/TLS into a remote access VPN?

A

An SSL/TSL gateway is necessary to convert SSL/TSL into a remote access VPN. The remote client’s browser establishes a connection with the gateway, instead of individual hosts within the site.

67
Q

In SSL/TLS remote access VPNs, to what device does the client authenticate itself?

A

The client authenticates itself to the SSL/TSL gateway, in SSL/TSL remote access VPNs.

68
Q

When a remote client transmits in an SSL/TLS VPN, how far does confidential transmission definitely extend?

A

When a remote client transmits through an SSL/TSL VPN, confidentiality goes as far as the SSL/TSL gateway, and no further.

69
Q

What three services do SSL/TLS gateways commonly provide?

A

SSL/TSL gateways commonly provide the following services:
Authentication (using a public key), connections to authorized resources within the site, and security for services within the site/network beyond the gateway.

70
Q

What is webification?

A

Webification is when a SSL/TSL gateway converts something that most browsers wouldn’t be able to interpret (such as the results of a db query) into a website for viewing.

71
Q

What software does the client need for basic SSL/TLS VPN operation?

A

For basic SSL/TSL VPN, a client simply needs a web browser. That’s it!

72
Q

For what purposes may the client need additional downloaded software?

A

Additional software, or plugins, might be needed in order to have transparent access to a subnet, or to provide other services, such as clearing the data that SSL/TSL tends to leave behind on clients.

73
Q

Why installing the additional downloaded software on the browser may be problematic?

A

Installing additional downloaded software often requires admin credentials on the client machine, which isn’t often the case.

74
Q

At what layer does IPsec operate?

A

IPsec operates on the internet layer, letting it protect the IP packet and everything within said packet’s data field.

75
Q

What layers does IPsec protect?

A

IPsec protects the higher layers, and does so “transparently”, that is, there’s no obfuscation. Transport layer protocols and application layer protocols are not even aware of IPsec’s presence.

76
Q

Why is IPsec’s transparent protection attractive compared with SSL/TLS’ nontransparent protection?

A

The transparency of IPsec’s protection reduces implementation and operating costs, because there’s no obfuscation to work around.

77
Q

What versions of IP can be used with IPsec?

A

IPv4 and IPv6 can both be used with IPsec.

78
Q

Distinguish between transport and tunnel modes in IPsec in terms of packet protection.

A

IPsec transport mode is host-to-host security, with each host communicating securely with one another, things becoming encrypted upon transmission. This is very secure, and very expensive. It also renders firewalls useless, as everything is encrypted, and the firewall can’t do its job.
IPsec tunnel mode involves two IPsec gateways, which encrypt and decrypt messages to and from their respective clients, and transmit securely between them and the other gateway. This is far cheaper, allows for the use of firewalls past the gateway, but the internal network is far less secure.