CRY Flashcards
mathematical function that determines the cryptographic operations
Algorithm
encryption system using a pair of mathematically related unequal keys
Asymmetric
Sender and receiver have public and private keys.
Public to encrypt a message, private to decrypt
Slower than symmetric, secret key (100 to 1000)
Asymmetric Cryptography
encrypt/decrypt request are processed in queues.
Asynchronous
statistical probabilities of a collision are more likely than one thinks
Birthday attack
manipulates toll-free line voltage to phone for free
Black Boxing
Segregating plaintext into blocks and applying identical encryption algorithm and key
Block Cipher
By Bruce Schneider key lengths 32 to 448 bits, used on Linux systems that use bcrypt (DES alternative)
Confidentiality Symmetric, Algorithm
Blowfish
tone simulation that mimics telephone co. system and allows long distance call authorization
Blue Boxing
with enough computing power trying all possible combinations
Brute Force
mono-alphabetic substitution cipher
Caesar cipher
blocks of 64 bits with 64bits initialization vector. Errors will propagate
CBC Cipher Block Chaining
PKI, entity trusted by one or more users as an authority in a network that issues, revokes, and manages digital certificates.
Certificate Authority
a temporary public file to inform others of a compromised digital certificate
Certificate revocation List (CRL)
a trusted issuer of digital certificates
Certification authority
stream cipher where the cipher text is used as feedback into key generation. errors will propagate
CFB, Cipher Feedback
a mathematical tool for verifying no unintentional changes have been made
Checksum
cryptographically transformation that operates on characters or bits. DES, word scramble, shift letters
Cipher
scrambled form of the message or data
Cipher text
situation wherein plain text messages generates identical cipher text messages using the same algorithm but with different crypto-variables or keys
Clustering
substitution at the word or phrase level
Code
cryptographic transformation that operates at the level of words or phrases. Example: “wedding” means “attack”
Codes
outputs within a given function are the same result
Collisions
joining two pieces of text -
Concatenation
RSA (Rivest, Shamir, Adelman) - Factoring large primes
Elliptic Curve Cryptosystem - Logs, discrete logs
Diffie-Hellman for key exchange
El Gamal
Confidentiality Asymmetric Algorithms
Confidentiality
Authentication
Non-repudiation
Key management easier
Access control
Integrity
Confidentiality Asymmetric Strengths
More processor-intensive than symmetric encryption
Still need to protect private key
Confidentiality Asymmetric Weaknesses
AES (Extended AES, Rijndael)
RC4
DES - Brute force can break it, but not flawed. Types Lucifer, Feistle Cipher, Triple DES.
Confidentiality Symmetric Algorithms
Confidentiality protection
Speed
Bulk encryption - large files efficiency
Availability of free algorithms
Confidentiality Symmetric Strengths
Key management
Scalability issues
Shared keys - No authentication or non-repudiation, Forgery by receiver is possible
Confidentiality Symmetric Weaknesses
mixing the key values during repeated rounds of encryption, make the relationship between ciphertext and key as complex as possible
Confusion
two certificate authorities that trust each other
Cross certification
code breaking, practice of defeating the protective properties of cryptography.
Cryptanalysis
Step by step procedure to encipher plaintext and decipher cipher text
Cryptographic Algorithm
code making
Cryptography
Confidentiality
Integrity
Proof of origin
Non-repudiation
Protect data at rest
Protect data in transit
Cryptography Goals
The study of cryptography and cryptanalysis
We think about Confidentiality, Integrity, and key exchange
Cryptology
cryptography + cryptanalysis
Cryptology - CRY
IPSec
TLS
Cryptology implementation
set of transformations from a message space to cipher space
Cryptosystem
key
Cryptovariable
secure long messages
CTR, Counter
descrambling the encrypted message with the corresponding key
Decipher
try a list of words in passwords or encryption keys
Dictionary attack
switching secret keys over an insecure medium without exposing the keys
Not encryption
Technically - Large prime generation, Groups
Diffie Hellman Key exchange
mix location of plaintext throughout ciphertext, change of a single bit should drastically change hash, dissipate pattern
Diffusion
a electronic attestation of identity by a certificate authority
Digital certificate
Asymmetric encryption of a hash of message
Digital Signature