Chapter 6 Flashcards

1
Q

4 fundamental goals of cryptography

A
  1. confidentiality
  2. integrity
  3. authentication
  4. non-repudiation
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

which goal ensures data remains private?

Confidentiality
Integrity
Authentication
Non-repudiation

A

Confidentiality

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

which kind of cryptography uses a shared secret key?

A

Symmetric

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

which kind of cryptography uses a combiniation public and private key?

A

asymmetric

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

which goal ensures that data is not altered without authorization?

Confidentiality
Integrity
Authentication
Non-Repudiation

A

Integrity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

what do encrypted message digests (digital signatures) enforce?

A

integrity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

which goal verifies the claimed identity of system users?

Confidentiality
Integrity
Authentication
Non-Repudiation

A

Authentication

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What does a challenge-response protocol prove?

A

Authentication

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

which goal assures that someone cannot claim they never did something?

Confidentiality
Integrity
Authentication
Non-Repudiation

A

Non-Repudiation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

which cryptosystem ensures nonrepudiation?

A

asymmetric

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

what is key space?

A

the range of values that are valid for use as a key for an algorithm

2^n where n is the bit size of the key

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

algorithms are made known and public, allowing anyone to examine and test them to ensure that a cryptographic system is secure even if everything about they system except the key is known

A

Kerckhoff’s principle

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

which standard defines the hardware and software requirements for cryptographic modules used by the federal government?

A

FIPS - Federal Information Processing Standard

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

random number that acts as a placeholder variable

A

nonce

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

key escrow

A

a cryptographic key is stored with a third party (recovery agent) for safekeeping

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

work function

A

the amount of time it takes to brute-force an encryption system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

how is a code different than a cipher

A

a cipher is a mathematical function that hides the true meaning of the original message. A code works on words or phrases and can be used to shorten phrases and is not necessarily meant to hide the meaning of the message.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Requirements for successful use of one-time pad

A
  1. key must be generated randomly
  2. key must be at least as long as the message
  3. pads must be protected against physical disclosure
  4. each pad must be used only one time
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

in this cipher, the encryption key is as long as the message and is chosen from a common book, newspaper, or magazine

A

running key cipher / book cipher

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

this cipher operates on chunks of a messages

A

block ciphers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

this cipher operates on one character or bit of a message at a time

A

stream ciphers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

key management best practices (3)

A

store keys securely
select keys using an approach that has as much randomness as possible
destroy keys when they are no longer needed

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

in what type of cryptography is the same key used to encrypt and decrypt the message?

A

symmetric
secret key
private key

“S”ymmetric = “S”ame key

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

4 problems of symmetric key cryptography

A
  1. key distribution - how do you share a key securely?
  2. does not implement non-repudiation
  3. not scalable - need to have a separate shared key for each person you talk to
  4. keys must be regenerated often
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

major strength of symmetric key cryptography

A

it can be implemented (encryption and decryption) very quickly

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

which type of cryptography requires two separate (but related) keys to encrypt and decrypt?

A

Asymmetric

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

6 strengths of asymmetric key cryptography

A
  1. each user only needs a single public and private key
  2. users are easily removed
  3. key regeneration is only required when a private key is compromised
  4. provides integrity, authentication, and nonrepudiation
  5. key distribution is simple
  6. no pre-existing link needs to exist for secure data exchange
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

Which cryptographic mode encrypts 64-bit blocks with a chosen secret key?

A

Electronic Code Book (ECB)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

which cryptographic method uses XOR on each block with the block of ciphertext immediately preceding it before it is encrypted?

A

CBC - Cipher Block Chaining

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q

as the memory buffer becomes full, it is encrypted; this mode uses and IV and chaining similarly to CBC but uses real-time data

A

CFB - Cipher Feedback Mode

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
31
Q

this mode is similar to CFB, but XORs plaintext with a seed value that is created from the IV

A

OFB - Output FeedBack mode

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
32
Q

stream cipher
uses a counter that increments for each operation
errors do not propogate

A

CTR - Counter Mode

33
Q

adds data authenticity controls to CTR mode with authentication tags

A

GCM - Galois/Counter Mode

34
Q

combination of CTR with CBC-MAC

used with 128-bit block length and requires use of a nonce for each transmission

A

CCM - Counter with Cipher Block Chaining Message Authentication Code Mode

35
Q

authenticated modes of encryption (2)

A

GCM - Galois/Counter Mode
CCM

36
Q

unauthenticated modes of encryption

A

ECB - Electronic Code Book
CBC - Cipher Block Chaining
CFB - Cipher Feedback
OFB - Output Feedback
CTR - Counter

37
Q

DES block size

A

64 bits

38
Q

DES modes

A

ECB
CBC
CFB
OFB
CTR

39
Q

DES key length

A

56 bits

8 bits of a 64 bit key are supposed to be used for parity

40
Q

DES rounds of encryption

A

16

41
Q

4 variants of 3DES

A

DES-EEE3
DES-EDE1
DES-EEE2
DES-EDE2

42
Q

block size of IDEA (International Data Encryption Algorithm)

A

64 bits

43
Q

starting key size of IDEA

A

128 bits

44
Q

size and number of subkeys of IDEA

A

52 16-bit subkeys

45
Q

5 modes of IDEA

A

the unauthenticated modes
ECB, CBC, CFB, OFB, CTR

46
Q

Blowfish block size

A

64-bit

47
Q

this encryption algorithm was released for public use with no license required and created by Bruce Schneier

A

Blowfish

48
Q

Skipjack block size

A

64-bits

49
Q

Skipjack key size

A

80 bit

50
Q

which encryption algorithm supports key escrow?

A

Skipjack

51
Q

which cipher was integrated into the WEP, WPA, SSL, and TLS protocols?

A

RC4

52
Q

Is RC4 still secure?

A

No

53
Q

key sizes of RC4

A

40 - 2048

54
Q

is RC4 block or stream?

A

stream

55
Q

is RC5 block or stream?

A

block

56
Q

block sizes of RC5

A

32, 64, or 128 bits

57
Q

key sizes of RC5

A

0 and 2040

58
Q

is RC6 block or stream?

A

block

59
Q

block size of RC5

A

128-bit

60
Q

key size of RC5

A

128, 192, or 256-bit keys

61
Q

three key strengths allowed by AES

A

128, 192, 256-bit

62
Q

which cipher replaced DES?

A

Rijndael

63
Q

AES rounds of encryption for 128-bit keys

A

10 rounds

64
Q

AES rounds for 192-bit keys

A

12 rounds

65
Q

AES rounds required for 256-bit keys

A

14 rounds

66
Q

Which kinds of algorithms use a Feistel network?

A

CAST

67
Q

is Twofish block or stream?

A

block

68
Q

Twofish block size

A

128-bits

69
Q

which algorithm uses the prewhitening and postwhitening techniques?

A

Twofish

70
Q

3 methods used to exchange secret keys

A

offline distribution
public key encryption
diffie-hellman key exchange algorithm

71
Q

which key storage option stores keys as digital objects on the system where they are used?

A

software-based key storage

72
Q

which key storage mechanism is easier to implement?

A

software-based key storage

73
Q

which key storage mechanism uses dedicated hardware devices like flash drives or smartcards?

A

Hardware-based storage

74
Q

which enterprise device manages keys for an organization?

A

HSM - Hardware Security Modules

75
Q

what is the purpose of key escrow systems?

A

to allow the government to obtain to cryptographic key for a particular communication from a central storage facility

76
Q

two major approaches to key escrow

A

fair cryptosystem
escrowed encryption standard

77
Q

which key escrow approach splits the keys up into two or more pieces, each of which is provided to a different independent third party that the government can retrieve the parts from in order to reconstruct the key

A

fair crypotsystems

78
Q

which escrow approach provides the government a technological means to decrypt cipher text?

A

escrowed encryption standard