Crypto Flashcards
Security through obscurity
Code obfuscation, steganography, SSID broadcast suppression, substitution ciphers
PFS (Perfect Forward Secrecy)
Designed to strengthen the security of session keys
Session Key features
used during single session, symmetric key
Confusion
Output of cryptographic function should be considerably different from the corresponding plain text
Digital signatures provide…
integrity, authentication, non-repudiaiton
Weak/deprecated crypto solutions
WEP, SSL, DES
ECC (Elliptic Curve Crypto)
Asymmetric, low processing, suitable for small devices
Means for providing randomization during encryption
Cryptographic nonce, salting, initialization vector (IV)
IV (Initialization Vector)
pseudo-random data used in combination with WEP & SSL key
Salt
Additional input that increases password complexity and provides better protection against brute-force, dictionary, and rainbow table attacks (also pseudo-data added to passwords before hashing)
Asymmetric Encryption
Public-key paired with a private key
GCM (Galois/Counter Mode)
Provides data integrity and confidentiality
ECB (Electronic Codebook)
Simplest/weakest kind of encryption
Symmetric encryption
session-key and secret-key
Obfuscation methods
Steganography, XOR cipher, ROT13
Bcrypt & PBKDF2
Key-stretching algorithms
Hashing algorithms
MD5, RIPEMD, HMAC, SHA
Diffie-Hellman
Commonly used asymmetric algorithm for exchange of symmetric keys
DSA
Cryptographic standard for digital signatures
Symmetric ciphers
RC4, DES, RSA, Blowfish, 3DES, Twofish
AES features
symmetric, with 128, 192, and 256bit keys, block cipher
Countermeasures against replay attacks
IPsec, Kerberos, and CHAP
A cryptographic downgrade attack
POODLE
Rainbow Table entry looks like…
Hash/password
Cryptographic attack where the attacker has access to both the plaintext and its encrypted version
KPA (Known-plaintext attack)
Birthday attacks rely on…
probability theory