CISSP ch 6 Flashcards
Symmetric modes of operation that propagate errors
CBC and CFB (stream version of CBC)
Symmetric modes of operation that provide authentication
GCM and CCM
HSM
Hardware security module
Manages cryptographic keys
Fair cryptosystems
Pieces of secret key are given to an independent third party who will share pieces with government pursuant to a court order
PKI
Public Key Infrastructure
Math of RSA
Factoring large prime numbers
Math of Elgamal
Modular arithmetic (extension of Diffie Helman), doubles size of message
Math of ECC
Elliptic curve cryptography, elliptic curve discrete logarithm problem
DHE / EDH
Diffie Helman key exchange, relies on factoring of prime numbers and modular arithmetic
ECDHE
Elliptic curve Diffie Helman exchange
SHA-256 message size
256 bits
SHA 256 block processing size
512 bits
SHA 224 processing block size
512 bits
SHA 512 message size
512 bits
SHA 512 processing block size
1024 bits
SHA 384 processing block size
1024 bits
MD5 processing block size
512 bits
MD5 message size
64 bits less than a multiple of 512
RIPEMD
RIPE message digest, hashing used in Bitcoin, only RIPEMD 160 and 320 are secure
HMAC
hashed message authentication code = implements a partial digital signature, guarantees integrity of message, but does not provide nonrepudiation = uses symmetric encryption / shared secret key that encrypts a hash value