Chapter Seven & Eight Flashcards

1
Q

Cryptography

A

The study of securing information through the use of codes, ciphers, encryption, and other security techniques

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Cryptanalysis

A

The study of how ciphers, codes, and cryptosystems work
and why

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Cryptology

A

The combined study of cryptography and cryptanalysis

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Kerckoff’s Principle

A

he security of a cryptosystem should not rely on the secrecy of the system

We want to assume attackers have access to knowledge before deploying
attacks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Caesar Cipher

A

– Replace each letter in a text by the 3rd letter
following it in the alphabet:
– ABCD becomes DEFG; CAT becomes FDW
– Variations rotate by different amounts
– Monoalphabetic substitution cipher

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Vigenere Cipher

A

– Named after 16th century author Blaise
Vigenère
– Uses a series of different rotations
– The “key” may be a word – each letter
indicates a rotation
– Polyalphabetic substitution cipher

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

he Data Encryption Standard (DES) (1977)

A

– Developed by IBM and US government
– Adopted by banks to protect the earliest
electronic bank transactions
* Supported 56-bit keys: 256 different keys
– 72,057,594,037,927,900
* Over 72 quadrillion keys (7 x 1016)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q
  • AES
A

128-bit, 192-bit, and 256-bit keys
– Smallest key is still too large for DES Cracker
* 128-bit key would take 1019 years

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Key stream…

A

It is a stream of bits with these properties:
– Attackers can’t predict its contents in practice

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

The RC4 Stream Cipher (1987)

A

Rivest Cipher 4 (RSA)
* Prioritized speed of encryption without loss of
data in limited systems
* Byte cipher, doesn’t work at the bit-level
* Used in Microsoft End-to-End Encryption, PDF,
SSL, etc.
* Broken due to biases in the secret key

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Pseudo-Random Numbers And Key
Streams (PRGNs)

A

Statistically random numbers: good for
simulations, bad for cryptography

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Known Ciphertext

A

or ciphertext only
– All we know is the ciphertext
– Most difficult situation, most common

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Known Plaintext

A

– We know some plaintext to match some of the ciphertext encrypted with a particular key

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Chosen Plaintext

A

We can choose some plaintext to encipher
with our victim’s cipher, and retrieve the
ciphertext

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Computational foundations

A

All strong encryption algorithms are built on top of “mathematically
intractable” algorithms (prime factorization – finding the factors of
extremely large prime numbers, discrete logarithms, etc.)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Cryptonet

A

set of people or devices that all
share the same secret key – transitive trust

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Public and private keys…

A

– Public keys can be shared with attackers
– Private keys are kept secret by the owner

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Elliptic Curve Cryptography

A

Similar to Diffie-Hellman
– Can calculate a shared secret
– Uses elliptic curve computations:
(y2 = x2 + ax + b)(mod p)
Elliptic curve key is 2–3x larger than a secret
key yielding a comparable search space

19
Q

Quantum key distribution

A

-Applies Heisenberg’s Uncertainty Principle to detect eavesdropping
– Demonstrated using satellite communications

20
Q

Quantum cryptanalysis

A

– Schor’s algorithm factors very large numbers
– A large quantum computer could attack
current public-key crypto techniques

21
Q

Birthday attack:

A

comes from the birthday
paradox, where in
n group of people, two of
which are bound to have the same birthday

Randomly create two of the same file until the
same hash value is generated

22
Q

MAC

A

cryptographic checksum applied to a
message

23
Q

Keyed hash

A

– A way of verifying that some of our data has
not been modified by an attacker
– Keyed Hash – a value created from both the
message and the secret key to create a MAC
(Message Authentication Code)

24
Q

Digital signature

A

A hash of the message
encrypted with the private key of the sender
– Includes…
* Hashing algorithm used
* Contents of the message
* Key generation algorithm
* Any other information provided by a CA

25
Q

Man-In-The-Middle Attack (MITM)

A

attack
where any communication of the keys is
intercepted and spoofed by the attacker
– Forge messages from one party as legitimate
without knowing the keys themselves; simply
use them to create false messages

26
Q

What is bit-flipping

A

It refers to a type of attack where an attacker modifies individual bits within a block of encrypted data in order to change its meaning or functionality. This attack is particularly effective against encryption schemes that use stream ciphers or block ciphers in certain modes of operation.

27
Q

Volume

A

a logical space containing its own filesystem

28
Q

a logical space containing its own filesystem

A

 Designed using loops or rounds
 Implements key schedules for different keys
 Feistel structure (AKA Feistel network)
 Skeleton of most block ciphers
 Drawbacks of block ciphers

Can’t account for information outside of where information is
encrypted

29
Q

Social engineering

A

Deceptive or manipulative practices to gain information from someone
(passwords, system configuration information, etc.)

30
Q

RC4 was used in early wireless encryption (T/F)

A

True

31
Q

Mode

A

is a technique for applying the cipher by
mixing its outputs to hide ciphertext patterns

32
Q

Cipher stream modes: (T/F) Both OFB and CTR can generate the keystream
before the data is available to encrypt

A

True

33
Q

Mode uses both XOR and the block cipher to
construct the ciphertext stream (T/F)

A

True

34
Q
A
35
Q

Most modes are mixing modes that hide patterns… Typical modes?

A

Typical modes:
– Electronic codebook (ECB) – no mixing at all
– Output feedback (OFB) – creates a keystream
– Counter (CTR) – creates a keystream
– Cipher feedback (CFB) – blocks and streams
– Cipher block chaining (CBC) – block oriented

36
Q

Drawbacks of block ciphers

A

Can’t account for information outside of where information is
encrypted

37
Q

AESGCM, XTS modes

A

Modern solution incorporating intermediate authentication values
(tag), advanced counter mode operations

38
Q

AES GCM ( Advanced Encryption Standard in Galois Counter Mode)

A

Requires the use of a “tag” to authenticate
certain vulnerable features about the
message
* Length of message, patterns in
message/ciphertext/encryption algorithm
vulnerabilities, etc

39
Q

AEAD –

A

Authenticated Encryption with
Additional Data

40
Q

MS Windows – BitLocker feature

A

True

41
Q

Apple OS X – FileVault feature

A

True

42
Q

PGPDisk – part of commercial PGP crypto

A

True

43
Q

Veracrypt – open-source FDE package

A

True

44
Q

XTS is length-preserving

A

Does not incorporate padding or
concatenation or reduction of encrypted data