Crypto Flashcards

1
Q

Cipher

A

Cryptographic algo

Series of well-defined steps that we use to encrypt plaintext

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Cryptanalysis

A

Science of breaking encrypted communication

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Cryptography

A

Creating message where content is hidden

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Cryptology

A

Science of securing communication

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Confusion

A

Relationship between plaintext and ciphertext

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Diffusion

A

Order of the plaintext should be diffused (dispersed) in the cyphertext

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Symetric number of key

A

n(n-1)/2

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Asymmetric number of keys

A

2n

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

3 DES which secure mode to use ?

A

K1?keymode 1

3different keyswith 112bitbkey strength

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Replacement of triple DES is ?

A

IDEA

128bit key, 64bit block size
Slower than AES and patented !

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Blowfish ?

A

Not secure
Block cypher
64bit blocks

Replaced by twofish

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Twofish ?

A

Block cypher 128bit blocks
Key length 128 , 192 or 256
Secure

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Feistel cipher

A

Plaintext block into two halves (Left and Right)

Used by a lot of cypher as DES, Twofish and 3 DES…

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

RC(4-6)

A

All symetrics

Rc4 stream cypher not secured used by wep wpa ssl and tls,40-2047 bit key length

Rc5 block cypher is secured, key length 0-2040, use s feistel

Rc6?bases on rc5 128bit block ans as aes for bit key length

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Diffie-Hellman

A

DH
Securely exchange crypto key over a public channel
Earliest practical ex of public key exchange

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

ECC

A

Elliptic Curve Cryptography

One way function
Asymmetric
Discret logarithms to elliptical curbes

Often on low power device as using shorter key length and be as secure

Patented
256bit key is just as strongas 3072 bit rsa key

17
Q

Rsa

A

Asymmetric

1094-4096 bit key
Slow
Patented during 1977-1997
Secure

18
Q

ElGamal

A

Asymmetric
Based on DH
Used by PGP, Gnu privacy Guard

19
Q

DSA

A

Asymmetric
Key generation has two phases
Use different algo than rsa

20
Q

MAC (Message Authentication Code)

A

Hash function using a key

Used for integrity and authenticity

21
Q

HMAC

A

Shared key with hashing

22
Q

The two uses of IPSec ?

A

1) AH: authentication header
Protect replay attack
Auth and integrity for each packet
As digital signature

2) ESP
For confidentiality
Can provide auth and integrity

Could use one of them or both

23
Q

The two mode of IPSec ?

A

Tunnel: encrypt and auth all package (headers included), for system that doesnt natively ipsec

Transport: only the payload, system that speak IPSEC

24
Q

Ipsec SA ?

A

Simplex one way like walkie talkie

25
Q

Ipsec isakmp ?

A

Handle the SA (security association) and key exchange mechanics

26
Q

IKE IPSEC ?

A

Negociate the types of encryption and hashes

27
Q

IDEA

A

Symetric block cypher
64bit cypher and 128 bit key