Chapter 8 - Cryptography Flashcards
How did Caesar cipher his text?
page 246
He shifted the letters 3 space to the right.
What is Substitution Ciphering?
page 246
Where each letter is substituted with another letter
What is Transposition Ciphering?
page 247
by changing the order of the group.
How does ROT13 ciphering work
page 278
By rotating the letter to the right 13 places
What is PKI?
page 278
Public-Key Infrastructure
Is intended to offer a means of providing security to messages and transaction on a grand scale.
Is a two-key, asymmetric with four main components: certificate authority (CA), registration authority (RA), RSA (the encryption algorithm) and digital certificates.
What is an organization that is responsible for issuing, revoking and distributing certificates.
page 279 Certificate Authority (CA)
What is the primary difference between and RA and an LRA?
page 281
LRA can be used to identify to establish the an individual. LRA involves the physical identification of the person requesting a certificate.
What is PKIX?
page 266
Public-Key Infrastructure X.509
What is PKCS?
page 266
Public-Key Cryptography Standards
What is X.509?
page 267
Defines the certificate formats and fields for public keys..
Also defines the procedure that should be used to distribute public keys.
What is X.509 v2 for?
page 267
CRL (Certificate Revocation List)
What is X.509 v3 for?
page 267
certificate
What are Symmetric Algorithms?
page 249
Require both ends of an encrypted message to have the same key and processing algorithm.
What is DES?
page 250
Data Encryption Standard
Has been used since the mid 70s.
It was the primary standard used in the government and industry until replaced by AES
What is AES?
page 250
Advanced Encryption Standard
RAS is named after who?
page 252
Ron Rivest
Adi Shamir
Leonard Adleman
What are some Asymmetric Algorithms?
page254
- Diffie-Hellman
- ElGamal
- Elliptic Curve (ECC)
- RSA
What three characteristics must Hashing Algorithms have?
page 255
- It must be one-way
- Variable length input produces fixed length output
- The algorithm must have few or no collisions
What types of Hashing algorithms should you be familiar with?
page 255
- Secure Hash Algorithm (SHA)
- Message Digest Algorithm (MD)
- RACE Integrity Primitive Evaluation Message Digest (RIPEMD)
- GOST
- LANMAN
- NTLM
What is Key Stretching?
page 256
Refers to the process used to take a key that might be a nit weak and make it stronger, usually by making it longer.
What methods are there for Key Stretching?
page 256
- PBKDF2 (Password-Based Key Derivative Function 2)
- Bcrypt
What some common code breaking methods?
page 257
- Frequency Analysis
- Chosen Plaintext
- Related Key Attack
- Brute Force Attacks
- Exploiting Human Error
What are the three most important concepts in Security?
page 259
- Confidentially
- Integrity
- Availibility
What is SET?
page 270
Secure Electronic Transaction
Provides encryption for credit card numbers that can be transmitted over the Internet. Visa and MasterCard developed it. SET is most suited fro transmitting small amounts of data.