Chapter 7 - Cryptography and the PKI Flashcards
Cryptography
Cryptography is the practice of encoding information in a manner that it cannot be decoded without access to the required decryption key.
Cipher
A Cipher is a method used to scramble or obfuscate characters to hide their value.
Substitution Cipher
A Substitution Cipher is a type of coding or ciphering system that changes one character or symbol into another.
Transposition Cipher
A Transposition Cipher involves transposing or scrambling the letters in a certain manner. Typically, the message is broken into blocks of equal size, and each block is then scrambled.
Steganography
Steganography is the art of using cryptographic techniques to embed secret messages within another file. These algorithms work by making alterations to the least significant bits of the many bits that make up image/video/audio/text files.
What are the four fundamental goals of cryptography?
- Confidentiality
- Integrity
- Authentication
- Non-repudiation
Confidentiality
Confidentiality ensures that data remains private when it is at rest, when it is in transit, and when it is in use.
Obfuscation
Obfuscation is the practice of making it intentionally difficult for humans to understand how code works.
Obfuscation is a concept closely related to confidentiality.
Full-Disk Encryption (FDE)
Full-Disk Encryption (FDE) is a form of encryption where all the data on a hard drive is automatically encrypted, including the operating system and system files. With this method, data is still vulnerable if the system is compromised while running.
Symmetric Cryptosystems
Symmetric Cryptosystems use a shared secret key available to all users of the cryptosystem. Symmetric Key Cryptography is also called Secret Key Cryptography and Private Key Cryptography.
Asymmetric Cryptosystems
Asymmetric Cryptosystems use individual combinations of public and private keys for each user of the system.
Key Space
For a cryptographic algorithm, the Key Space is the range of values that are valid for use as a key for a specific algorithm.
Block Ciphers
Block Ciphers operate on ‘chunks’ of a message and apply the encryption algorithm to an entire chunk at the same time. Most modern encryption algorithms implement some type of block cipher.
Stream Ciphers
Stream Ciphers operate on one character or bit of a message at a time.
What are some of the weaknesses associated with symmetric key cryptography?
- Key exchange must be secure
- Does not implement non-repudiation
- The algorithm does not scale well
- Keys must be regenerated often
Hash Collisions
A Collision is where a hash function produces the same value for two different methods. This typically leads to the deprecation of said hashing algorithm.
3DES
3DES is an adapted version of DES (Data Encryption Standard) that simply uses the DES algorithm three different times with three different encryption keys. Both of these algorithms are considered insecure.
AES
The Advanced Encryption Standard cipher allows the use of three key strengths: 128 bits, 192 bits, and 256 bits. Today, AES plays an essential role in wireless network security, the Transport Layer Security (TLS) protocol and file/disk encryption.
Key Management Practices
Key Management Practices, the extraordinary measures taken to protect the security of encryption keys, include safeguards surrounding the creation, distribution, storage, destruction, recovery and escrow of keys.
What are the three main methods used to exchange secret symmetric keys securely?
- Offline distribution
- Public key encryption
- Diffie-Hellman key exchange algorithm