Cryptography Flashcards
Encryption vs Encoding
Encoding - transformation of data to be used on a different system
not secret
Encryption - secret
Define a Stream Cypher vs a Block Cypher
Stream encrypts one bit at a time
Block encrypts one block at a time.
Define Confidentiality
Confidentiality is the protection of information such that only the originator and intended recipients can see the information. In essence this means data is being encrypted.
Define Authentication
Authentication is where the identity or authenticity of an entity (such as a user logging into a PC) is verified. The entity could be a user, message or device. User/message authentication normally pertains to the checking of a user’s/originators claimed identity.
Define Integrity (data).
Integrity involves mechanisms that ensure that if data has been modified, changed or deleted, the modification can be detected. This includes detection of anyone attempting to insert data into communications traffic.
Define non-repudiation.
Non-repudiation protects against one party in a communication exchange claiming that it never occurred. There are various forms of non-repudiation, including non-repudiation of origin and non- repudiation of receipt.
Define DES
Data Encryption Standard
was the first common digital encryption algorithm used extensively by businesses rather than governments.
Now obsolete
Define 3DES
Triple DES was brought in after some weaknesses were found in DES, but purely as a stopgap until a brand new algorithm could be developed and standardised. Now obsolete.
Define AES
The Advanced Encryption Standard. Symmetric Key Algorithm.
Only publicly accessible cypher approved by the NSA
Define RSA
Asymmetric Cryptography Algorithm
Rivest–Shamir–Adleman
It is based on the principle that it is easy to multiply large numbers, but factoring large numbers is very difficult. For example, it is easy to check that 31 and 37 multiply to 1147, but trying to find the factors of 1147 is a much longer process.
Define MD5
Message Digest Algorithm
One way.
Not collision free so not recommended for use.
Define SHA
Secure Hashing Algorithm
Available in SHA 1,2 and 3
1 is no longer used.
2 and 3 are collision free.
Define HMAC
Hash-Based Message Authentication Code