Chapter 7 Cryptography and the Public Key Infrastructure Flashcards
Substitution Cipher
Changes one symbol/character into another. the Identity of the character is changed, but it’s position is unchanged.
Caesar Cipher, ROT13
Polyalphabetic sub cipher uses multiple alphabets for the same message.
Transposition Cipher
Character position changes but the value/identity remains the same.
Columnar Transpostion: chosen number of columns IS the key.
Stenography
Embedding secret messages within another file like a picture.
Four Fundamental Goals of Cryptography
Confidentiality, Integrity, Authentication, Nonrepudiation
Confidentiality
Cryptographic systems must ensure data remains private at rest, in use, and in motion.
The preservation of secrecy for stored information and communication.
Obfuscation
Intentionally making something difficult for humans to understand.
Integrity
Ensures data is not altered without authorization. Digital signatures enforce the concept of integrity, and can be enforced through both public key (asymm) and secret key (symm) cryptosystems.
Authentication
verifies the claimed identity of system users and is a major function of cryptosystems. Challenge response authentication ensures that Bob is who he claims to be.
Nonrepudiation
provides assurance to the recipient that the message was originated by the sender and not a masquerade. Also prevents sender from claiming they didn’t send the message. Symmetric Key systems do NOT provide for Nonrepudiation!
Kerchoff Principle
A cryptosystem should be secure even if everything about the system (except the private key) is public knowledge.
Block Cipher vs. Stream Cipher
Block Cipher apply encryption algorithm to each chunk or block of a message at a time.
Stream Ciphers operate on one character or bit of a message/data stream at a time.
Symmetric Key Algorithm (shared secret key)
relies on shared secret encryption key that is distributed to all participating members. Difficult to break with large key, however:
- Key distribution is a major problem
- Doesn’t have nonrepudiation
- Algorithm not scalable
- Keys must be regenerated often
+very fast, much faster than asymmetric key encryption
Asymmetric Key Algorithm (public key)
Each user has a public key and a private key. Opposite keys must be used in tandem to encrypt or decrypt.
+ additional users only require creating one public/private key pair
+ Users can be removed easily
+ Key regeneration only required when private key is compromised
+ Provides for Integrity, authentication as well as nonrepudiation
+ Key distribution is simple
+ No pre-existing communication link necessary
- slow speed of operation
DES/Triple DES (symmetric key)
DES is a 64-bit block cipher with 5 modes, the key is 56-bits long.
- uses exclusive (XOR) operation which produces a unique output each time.
Triple DES uses the same algorithm over again with different keys. DES-EEE3 notes the number of encryption operations. All variations are now considered equally secure.
DES mode 1: ECB
Electronic Codebook Mode, simplest and least secure. encrypts block using chosen secret key.
Impractical on all but the shortest transmissions.
DES Mode 2: CBC
Cipher Block Chaining uses an initializing vector (IV) randomly selected value to start process. combines IV with first block using XOR.
In CBC, errors propagate.
DES Mode 3: CFB
Cipher Feedback Mode is a streaming version of CBC, so it processes data realtime.
DES Mode 4: OFB
Output Feedback Mode is similar to CFB, but instead of XORing previous encrypted block, DES XOR’s the plain text with seed. No chaining function, so errors do not propagate.
DES Mode 5: CTR
Counter Mode is a stream similar to CFB and OFB, but instead of seed, it uses a counter that increments each operation. Errors do not propagate.
AES (symmetric key)
Advanced Encryption Standard is a symmetric block cipher that replaces DES. Allows 3 key strengths: 128, 192, 256. AES only processes 128 bit blocks but encryption rounds can be increased to reach the key size required.
Key Exchange - 3 methods
Offline
Public Key Encryption- Many people use public key encryption (asymm) to set up comms link, then use secret key (symm) because of the superior speed.
Diffie-Hellman - algorithm that allows the exchange of secret keys over an unencrypted network.
Diffie-Hellman
“Standard Discrete Logarithm” that allows the exchange of secret keys over an unsecured network.
Key Escrow
Key escrow allows an authority to obtain a cryptographic key from a central storage facility or 2+ parties holding a split key. This may be a result of a court order or other authoritative motive.
RSA (public key/asymm)
RSA public key algorithm remains the worldwide standard. Relies on computational difficulty of factoring large prime numbers.
How to determine key length?
Weigh the difficulty of defeating a given key length against the importance of the data.