CHAPTER 7_Cryptography Flashcards
Emphasis: Replay Attacks
Replay AttacksA big concern in distributed environments is the replay attack, in which an attacker captures some type of data and resubmits it with the hopes of fooling the receiving device into thinking it is legitimate information. Many times, the data captured and resubmitted are authentication information, and the attacker is trying to authenticate herself as someone else to gain unauthorized access.
Bullets: Algebraic attack
Cryptanalysis attack that exploits vulnerabilities within the intrinsic algebraic structure of mathematical functions.
Emphasis: work factor
As explained earlier in this chapter, work factor is the amount of time and resources it would take for someone to break an encryption method. In asymmetric algorithms, the work factor relates to the difference in time and effort that carrying out a one-way function in the easy direction takes compared to carrying out a one-way function in the hard direction. In most cases, the larger the key size, the longer it would take for the bad guy to carry out the one-way function in the hard direction (decrypt a message).
Bullets: Chosen-plaintext attack
Cryptanalysis attack where the attacker can choose arbitrary plaintexts to be encrypted and obtain the corresponding ciphertexts.
Emphasis: The pad must be made up of truly random values
• The pad must be made up of truly random values. This may not seem like a difficult task, but even our computer systems today do not have truly random number generators; rather, they have pseudorandom number generators.
Emphasis: asymmetric algorithms
Cryptography algorithms are either symmetric algorithms, which use symmetric keys (also called secret keys), or asymmetric algorithms, which use asymmetric keys (also called public and private keys). As if encryption were not complicated enough, the terms used to describe the key types only make it worse. Just pay close attention and you will get through this fine.
Emphasis: Trusted Platform Module
Trusted Platform ModuleThe Trusted Platform Module (TPM) is a microchip installed on the motherboard of modern computers and is dedicated to carrying out security functions that involve the storage and processing of symmetric and asymmetric keys, hashes, and digital certificates. The TPM was devised by the Trusted Computing Group (TCG), an organization that promotes open standards to help strengthen computing platforms against security weaknesses and attacks.
Emphasis: block cipher
When a block cipher is used for encryption and decryption purposes, the message is divided into blocks of bits. These blocks are then put through mathematical functions, one block at a time. Suppose you need to encrypt a message you are sending to your mother and you are using a block cipher that uses 64 bits. Your message of 640 bits is chopped up into 10 individual blocks of 64 bits. Each block is put through a succession of mathematical formulas, and what you end up with is 10 blocks of encrypted text. You send this encrypted message to your mother. She has to have the same block cipher and key, and those 10 ciphertext blocks go back through the algorithm in the reverse sequence and end up in your plaintext message.
Bullets: One-time pad
Encryption method created by Gilbert Vernam that is considered impossible to crack if carried out properly
Bullets: Diffie-Hellman algorithm
First asymmetric algorithm created and is used to exchange symmetric key values. Based upon logarithms in finite fields.
Bullets: Acquirer (merchant’s bank)
The financial institution that processes payment cards.
Emphasis: asynchronous
Synchronous cryptosystems use keystreams to encrypt plaintext one bit at a time. The keystream values are “in synch” with the plaintext values. An asynchronous cryptosystem uses previously generated output to encrypt the current plaintext values. So a stream algorithm would be considered synchronous, while a block algorithm using chaining would be considered asynchronous.
Bullets: Cryptology
The study of both cryptography and cryptanalysis
Explanations: El Gamal
El Gamal is a public key algorithm that can be used for digital signatures, encryption, and key exchange. It is based not on the difficulty of factoring large numbers but on calculating discrete logarithms in a finite field. El Gamal is actually an extension of the Diffie-Hellman algorithm.
Bullets: Cookies
Data files used by web browsers and servers to keep browser state information and browsing preferences.
Bullets: Replay attack
Valid data transmission is maliciously or fraudulently repeated to allow an entity gain unauthorized access.
Bullets: One-way hash
Cryptographic process that takes an arbitrary amount of data and generates a fixed-length value. Used for integrity protection.
Bullets: Statistically unpredictable keystream
Bits generated from the keystream generator cannot be predicted.
Emphasis: one-time pad
A one-time pad is a perfect encryption scheme because it is considered unbreakable if implemented properly. It was invented by Gilbert Vernam in 1917, so sometimes it is referred to as the Vernam cipher.
Explanation Bullets: PKI supplies the following security services:
- Confidentiality
- Access control
- Integrity
- Authentication
- Nonrepudiation
Explanations: Types of Asymmetric Systems
As described earlier in the chapter, using purely symmetric key cryptography has three drawbacks, which affect the following:
Emphasis: Pretty Good Privacy (PGP)
Pretty Good Privacy (PGP) was designed by Phil Zimmerman as a freeware e-mail security program and was released in 1991. It was the first widespread public key encryption program. PGP is a complete cryptosystem that uses cryptographic protection to protect e-mail and files. It can use RSA public key encryption for key management and use IDEA symmetric cipher for bulk encryption of data, although the user has the option of picking different types of algorithms for these functions. PGP can provide confidentiality by using the IDEA encryption algorithm, integrity by using the MD5 hashing algorithm, authentication by using the public key certificates, and nonrepudiation by using cryptographically signed messages. PGP uses its own type of digital certificates rather than what is used in PKI, but they both have similar purposes.
Emphasis: Certificates
CertificatesOne of the most important pieces of a PKI is its digital certificate. A certificate is the mechanism used to associate a public key with a collection of components in a manner that is sufficient to uniquely identify the claimed owner. The standard for how the CA creates the certificate is X.509, which dictates the different fields used in the certificate and the valid values that can populate those fields. The most commonly used version is 3 of this standard, which is often denoted as X.509v3. Many cryptographic protocols use this type of certificate, including SSL.
Explanations: Digital Signatures
To do a digital signature, do I sign my name on my monitor screen?Response: Sure.