Chapter 7: PKI and Cryptographic Applications Flashcards
_______ key cryptosystems assign each user a pair of keys: a public key and a private key.
Public
y2 = x3 + ax + b
elliptic curve formula
An approach to key exchange that allows two individuals to generate a shared secret key over an insecure communications channel
Diffie–Hellman algorithm
produces a 256-bit message digest using a 512-bit block size
SHA-256
uses a truncated version of the SHA-256 hash that drops 32 bits to produce a 224-bit message digest using a 512-bit block size.
SHA-224
produces a 512-bit message digest using a 1,024-bit block size
SHA-512
uses a truncated version of the SHA-512 hash that drops 128 bits to produce a 384-bit digest using a 1,024-bit block size.
SHA-384
a partial digital signature—it guarantees the integrity of a message during transmission, but it does not provide for nonrepudiation.
hashed message authentication code (HMAC)
These neutral organizations offer notarization services for digital certificates.
Certificate authorities (CAs)
counting the number of times each letter appears in the ciphertext
frequency analysis
the attacker has a copy of the encrypted message along with the plaintext message used to generate the ciphertext (the copy)
Known Plaintext
the attacker obtains the ciphertexts corresponding to a set of plaintexts of their own choosing
Chosen Plaintext
the attacker has the ability to decrypt chosen portions of the ciphertext message and use the decrypted portion of the message to discover the key
Chosen Ciphertext
Attackers might use a _______ attack to defeat encryption algorithms that use two rounds of encryption.
meet-in-the-middle
a malicious individual sits between two communicating parties and intercepts all communications (including the setup of the cryptographic session)
Man in the Middle