Chapter 9: Cryptography and Symmetric Key Algorithms Flashcards

1
Q

What are the goals of cryptography?

A

Confidentiality, integrity, authentication, and nonrepudiation.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is the purpose of confidentiality?

A

It insures that data remains private while at rest or in transit.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is the purpose of integrity?

A

It ensures that data is not altered without authorization.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is the purpose of authentication?

A

It verifies that the claimed identity of system users is accurate.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is the purpose of nonrepudiation?

A

It provides assurance t the recipient that a message was actually originated by the sender and not by someone masquerading as them.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is “key space”?

A

The range of values that are valid as a key for a specific algorithm.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is the Kerchoff Principle?

A

The principle that a cryptographic system should be secure even if everything is known about the system except the key.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is a private key cryptosystem?

A

One in which all participants use a shared secret key.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is a public key cryptosystem?

A

Each participant has their own pair of keys.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is a cryptovariable?

A

Another name for a key.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is cryptography?

A

The art and practice of implementing secret codes and cyphers.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What does FIPS 140-2 define?

A

Hardware and software requirements for cryptographic modules that the government uses.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What defines hardware and software requirements for cryptographic modules for government use?

A

FIPS 140-2

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is boolean mathematics?

A

The definition of rules for bits and bytes that form the nervous system of a computer. AND, OR, NOT, XOR, etc.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is a one way function?

A

A mathematical operation that easily produces output values for each possible combination of inputs, but makes it impossible to retrieve the input values.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What kind of function are all public key cryptosystems based on?

A

A one way function.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

What is a nonce?

A

A random number that acts as a placeholder in mathematical functions. A “number used once”.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

What is a zero-knowledge proof?

A

A proof that shows that a party has a particular piece of information without revealing that piece of information.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

What is split knowledge?

A

Separation of duties over two or more persons, such as giving n parts of a key to n people and requiring a certain number of them to work together to access an object.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

What is a work function or work factor?

A

A measure of the effort or time required to circumvent a cryptographic system. It should be greater than the value of the asset to be effective.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

What is a code?

A

A cryptographic system of symbols that represents words or phrases. Not usually intended to provide confidentiality. Example: the 10-system used by law enforcement.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

What is a cipher?

A

Always intended to hide the meaning of a message. Generally alter or rearrange the bits of a message.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

What is a transposition cipher?

A

An encryption algorithm that rearranges the leters of a plaintext message.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

What is a substitution cipher?

A

An encryption algorithm that replaces each character of the plaintext with a different character.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

What is a one-time pad?

A

A substitution cipher that uses a different substitution alphabet for each letter of the message.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

What are the requirements for a one time pad?

A

It must be randomly generated
It must be physically protected against disclosure.
It must be used only once.
The key must be at least as long as the message.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

What is a running key cipher?

A

An encryption key is chosen from something like a book beginning at a certain place in the text.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

What is a block cipher?

A

A cipher that operates on a message in chunks, applying the algorithm to the entire chunk at once.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

What is a stream cipher?

A

A cipher that operates on one character or bit of a message at a time.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q

Describe confusion and diffusion in cryptographic terms

A

Confusion occurs when the relationship betwen the plaintext and the key is so complicated that the attacker can’t merely continue altering the plaintext and analyzing the resulting ciphertext to determine the key.

Diffusion occurs when a change in the plain text results in multiple changes spread throughout the ciphertext.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
31
Q

How do modern cryptosystems work?

A

they use computationally complex algorithms and long cryptanalytic keys.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
32
Q

How should you select key length?

A

With consideration to the procesing power available to your adversaries now and in the future. If you want something to stay secret for 20 years, it has to be proof against the computing power that could be brought to bear agsint it over the next 20 years.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
33
Q

What is a symmetric key algorithm?

A

One that relies on a shared secret encryption key that all members of the communication must have.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
34
Q

What are the weaknesses of symmetric key algorithms?

A

Key distribution
No nonrepudiation
It’s not scalable unless each pair of users has their own shared key (and that’s ugly)
Keys have to be regenerated if any member of the group leaves

35
Q

What is an asymmetric key algorithm?

A

AKA public key. Everyone has a public key, which can be publicly known, and a private key.

36
Q

What are the strengths of asymmetric key algorithms?

A

Adding a user requires only generating one new public/private pair
It’s easy to remove a user (key revocation)
Key regeneration is only required if someone’s private key is compromised
Provides for integrity, authentication, and non-repudiation
Key distribution is easy
No need for preexisting communcation links.

37
Q

What is the major weakness of public key crypto?

A

It’s slow.

38
Q

How do you overcome the major weakness of public key crypto?

A

Use public key crypto to set up symmetric crypto, then do the heavy lifting with that.

39
Q

What is a hashing algorithm?

A

A one way function that provides a difficult to forge signature

40
Q

What are common hashing algorithms?

A

MD2, MD5, SHA-0, SHA-1, SHA-2, HMAC

41
Q

What is the block size of DES?

A

64 bits

42
Q

What is the key size of DES?

A

56 bits

43
Q

What are the five modes of operation of DES?

A
Electronic Code Book (ECB)
Cipher Block Chaining (CBC)
Cipher Feedback (CFB)
Output Feedback (OFB)
Counter (CTR)
44
Q

What is Electronic Code Book

A

Each block is simply encrypted with the key.

45
Q

What is Cipher Block Chaining?

A

Each block of unencrypted text is XORed with the block of ciphertext preceding it before encryption. This mode propagates errors.

46
Q

What is Cipher Feedback mode?

A

The streaming version of Cipher Block Chaining.

47
Q

What is Output Feedback mode?

A

Instead of XORing with the prior encrypted text, we XOR with a seed value. Each subsequent block is XORed with the encrypted value of the prior seed. As a result, errors do not propagate.

48
Q

What is Counter mode?

A

The seed value simply increments. Errors do not propagate.

49
Q

What is Triple-DES?

A

An adapted version of DES that uses the same algorithm to produce a more secure encryption.

50
Q

What is blowfish?

A

Developed by Bruce Schneier. 64-bit block cipher. Keys 32-448 bits. Faster than IDEA and DES. Free for public use.

51
Q

What is Skipjack?

A

Approved for US government use by FPS 185. 64-bit block cipher. 80-bit key. Supports key escrow. Used in the Clipper and Capstone chips.

52
Q

What is AES?

A

Advanced Encryption Standard. Rijndael. Key: 128, 192, or 256 bits. 128-bit key requires 10 rounds, 192-bit key requires 12, 256-bit requires 14.

53
Q

What is the block size for AES?

A

128.

54
Q

What are the four versions of 3DES?

A

DES-EEE3: simply encrypt the plaintext 3 times using three different keys
DES-EDE3: also uses three keys, but the second operation is a decrypt instead of encrypt
DES-EEE2: 3 encryption steps using 2 keys. The second and first encryption steps use the same key.
DES-EDE2: encrypt using K1, decrypt using K2, encrypt using K1.

55
Q

What is IDEA?

A

International Data Encryption Algorithm.

64-bit block cipher
128-bit key, which is broken up into 52 16-bit keys

56
Q

What is the key size for AES?

A

128, 192, or 256.

57
Q

What is the block size for Rijndael?

A

Variable

58
Q

What is the key size for Rijndael?

A

128, 192, or 256 (same as AES)

59
Q

What is the block size for blowfish?

A

Variable.

60
Q

What is the key size for blowfish?

A

1-448

61
Q

What is the block size for DES?

A

64

62
Q

What is the key size for DES?

A

56

63
Q

What is the block size for IDEA?

A

64

64
Q

What is the key size for IDEA?

A

128

65
Q

What is IDEA used in?

A

PGP

66
Q

What cipher is known for being used in PGP?

A

IDEA

67
Q

What is the block size of RC2?

A

64

68
Q

What is the key size for RC2?

A

128

69
Q

What is the block size for RC4?

A

None, it’s a stream cipher.

70
Q

What is the key size for RC4?

A

128

71
Q

What is the block size for RC5?

A

32, 64, 128

72
Q

What is the key size for RC5?

A

0-2,048

73
Q

What is the block size for Skipjack?

A

64

74
Q

What is the key size for Skipjack?

A

80

75
Q

What is the block size for Triple DES (3DES)?

A

64

76
Q

What is the key size for Triple DES (3DES)?

A

112 or 168

77
Q

What is the block size for Twofish?

A

128

78
Q

What is the key size for Twofish?

A

1-256

79
Q

Describe offline key distribution.

A

Most technically simple mechanisms. Risks: mail can be intercepted, phone calls can be tapped, papers containing keys can be thrown away or lost.

80
Q

Descfibe public key encryption key management

A

Use public key exchange to set up an encrypted session, than share a symmetric encryption key over that protected, but slower, link.

81
Q

What are the recommendations for storage and destruction of symmetric keys?

A

Never store a key on the same system where encrypted data resides
For sensitive keys, consider giving half the key to different individuals. (aka split knowledge)

82
Q

What are the major approaches to key escrow?

A

Fair cryptosystem: Secret keys are broken into n pieces and given to n independent third parties who provide the pieces when court-ordered to do so.

Escrowed encryption standard: Provides the government with a technical means to decrypt ciphertext.

83
Q

Describe the cryptographic life cycle.

A

1) Specify cryptographic algorithms acceptible for use in the oganization
2) Identify acceptable key lengths based on the sensitivity of the information
3) Enumerate secure transaction protocols that may be used