Chapter 6 Cryptography and Symmetric Key Algorithms Flashcards
To encrypt a message, you simply shift each letter of the alphabet three places to the
right
Caesar cipher r .
a cryptographic system should be secure
even if everything about the system, except the key, is public knowledge.
The Kerchoff Principle
random number that acts as a placeholder variable in mathematical functions.
nonce
Zero-Knowledge Proof
zero-knowledge proof
When the information or privilege required to perform an operation is divided among
multiple users, no single person has suffi cient privileges to compromise the security
of an environment.
Split Knowledge
a minimum number of agents out of the total number of agents work together to perform high-security tasks.
M of N Control
cryptographic systems of symbols that represent words or phrases,
Codes
always meant to hide the true meaning of a message
Ciphers
________ use an encryption algorithm to rearrange the letters of a plaintext message, forming the ciphertext message.
Transposition ciphers
use a different substitution alphabet for each letter of the plaintext message.
one-time pad
the encryption key is as long as the m r essage itself and is often
chosen from a common book
running key cipher
the relationship between the plain text
and the key is so complicated that an attacker can’t merely continue altering the plain
text and analyzing the resulting ciphertext to determine the key.
Confusion
a change in the plain text results in multiple changes spread throughout the ciphertext.
Diffusion
Advanced Encryption Standard (AES)
Block Size____ bits
Key Size _____ bits
Block Size - 128
Key size - 128, 192, 256
Skipjack
Block Size____ bits
Key Size _____ bits
Block Size 64
Key size 80
IDEA (used in PGP)
Block Size____ bits
Key Size _____ bits
Block size 64
Key size 128
Twofish
Block Size____ bits
Key Size _____ bits
Block size 128
Key size 1 - 256
DES
Block Size____ bits
Key Size _____ bits
Block size 64
Key size 56
Triple DES (3DES)
Block Size____ bits
Key Size _____ bits
Block size 64
Key size 168
_______ was developed in response to complaints about the insufficient key length of the DES algorithm.
International Data Encryption Algorithm (IDEA)
International Data Encryption Algorithm key is broken up in a series of operations into __ 16-bit subkeys.
52
Which algorithm supports the escrow of encryption keys ?
Rijndael
Twofish
Skipjack
Blowfish
Skipjack
Twofish uses two techniques not found in other algorithms
Prewhitening
Postwhitening
Involves XORing the plain text with a separate subkey before the first round of encryption.
Prewhitening
Postwhitening
Prewhitening