Crypto ch 8 Flashcards

1
Q

Asymmetric cipher

A

Crypto algorithms that use two different keys-1 key to encrypt and another to decrypt. Also called public key crypto

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Chap

A

Challenge hand shake authentication protocol

A authentication protocol that PERIODICALLY reauthenticates

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Collision

A

When 2 different inputs into crypto hash produce the same output, this is known as a collision.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Cryptographic hash

A

A function that is 1 way (non reversible) has a fixed length output and is collision resistant.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

PRNG

A

A pseudo-random number generator is and algorithm used to generate a number that is sufficiently random for cryptographic purposes.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Rainbow table

A

A table precomputed hashes used to guess passwords by searching for the hash of a password.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Salt

A

Bits added to a hash to make it resistant to rainbow table attacks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Symmetric cipher

A

Any cryptographic algorithm that uses the same key to encrypt and decrypt. DES, AES, and Blowfish are examples
Skl and taclanes
Gost

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

X.509

A

X.509 standard is the most widely used standard for digital certificates

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Cryptool 1.4.40
Md-message digest md5 56bits has a high rate of collision
2 diff inputs has same output

Sha-has different bits

A

Hex value based on integrity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q
Cast
3des*168 bits
Blowfish/2fish/Bruce schneir 64bit Blck 
Rcx(rc4/rc5)*2,048bits
Aes * by joan daemen/ Vincent rijmen 128/192/256 (hard drive)
Idea
Des*
Skipjack,safer,safer+secpent
Sym 
Same key encrypt to decrypt 
Out of band delivery, different times
Otr-over the air rekey 
Great for bulk encryption
A

-Different-Hellman founder pub/Pvt key
E-lliptic curve cryp-sim to rsa strng shrt Mobile
-ElgMal-transmitting dig sig and key exchanges
-Ecdhe
-Rsa-widely used .ron rivest, adi Shamir, Leonard adleman public key uses large integers

Asym
Strong and slower

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

SHA

A

Secure hash algorithm-provides hash value that can be used and encryption protocol

160bithash

Sha2-224,256,334,512
Sha3-

None as keccak

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Key stretching

A

Password based key function derevation 2

Making the key stronger

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Crypto-analysis methods

A
  • Brute force
  • frequency analysis
  • known plain text
  • chosen plain text
  • related key attack
  • birthday attack
  • other methods
  • exploiting human error
  • wi-if encryption
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Cryptographic systems

A
Confidentiality & strength
Integrity
When to encrypt
Digital signatures
Authentication 
Nonrepudiation 
Key features
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Pgp

A

Proprietary and is (pretty good privacy)

17
Q

Tunneling protocols

A

PPTP
L2f
Tunneling protocol

18
Q

FIPS

A

Federal information processing standards

19
Q

PkI

Scaling up security

A

Two way, asymmetric system w 4 main components

  • certificate authority -issue/revoking/distro certs
  • registration authority-take a req on behalf and send to ca. Can distro keys, valid indent
  • rsa
  • digital certificates
  • lra-local registration authority
20
Q

Certificate revocation list

A

Revoking before it expires

Crl-certificate revoc list
Ocsp-online certificate status protocol
Repository-database our database server where the certs are stored

21
Q

Trust models with pki

A
  • Hierarchical -aka tree at the top provides all information
  • bridge-p2p relationships exists between root ca’s
  • mesh-expands bridge model by supporting multiple paths and multiple roots
  • hybrid-can use the capabilities of any or all of the structures discussed in previous sections