Crypto ch 8 Flashcards
Asymmetric cipher
Crypto algorithms that use two different keys-1 key to encrypt and another to decrypt. Also called public key crypto
Chap
Challenge hand shake authentication protocol
A authentication protocol that PERIODICALLY reauthenticates
Collision
When 2 different inputs into crypto hash produce the same output, this is known as a collision.
Cryptographic hash
A function that is 1 way (non reversible) has a fixed length output and is collision resistant.
PRNG
A pseudo-random number generator is and algorithm used to generate a number that is sufficiently random for cryptographic purposes.
Rainbow table
A table precomputed hashes used to guess passwords by searching for the hash of a password.
Salt
Bits added to a hash to make it resistant to rainbow table attacks.
Symmetric cipher
Any cryptographic algorithm that uses the same key to encrypt and decrypt. DES, AES, and Blowfish are examples
Skl and taclanes
Gost
X.509
X.509 standard is the most widely used standard for digital certificates
Cryptool 1.4.40
Md-message digest md5 56bits has a high rate of collision
2 diff inputs has same output
Sha-has different bits
Hex value based on integrity
Cast 3des*168 bits Blowfish/2fish/Bruce schneir 64bit Blck Rcx(rc4/rc5)*2,048bits Aes * by joan daemen/ Vincent rijmen 128/192/256 (hard drive) Idea Des* Skipjack,safer,safer+secpent
Sym Same key encrypt to decrypt Out of band delivery, different times Otr-over the air rekey Great for bulk encryption
-Different-Hellman founder pub/Pvt key
E-lliptic curve cryp-sim to rsa strng shrt Mobile
-ElgMal-transmitting dig sig and key exchanges
-Ecdhe
-Rsa-widely used .ron rivest, adi Shamir, Leonard adleman public key uses large integers
Asym
Strong and slower
SHA
Secure hash algorithm-provides hash value that can be used and encryption protocol
160bithash
Sha2-224,256,334,512
Sha3-
None as keccak
Key stretching
Password based key function derevation 2
Making the key stronger
Crypto-analysis methods
- Brute force
- frequency analysis
- known plain text
- chosen plain text
- related key attack
- birthday attack
- other methods
- exploiting human error
- wi-if encryption
Cryptographic systems
Confidentiality & strength Integrity When to encrypt Digital signatures Authentication Nonrepudiation Key features