Cryptography Flashcards
IPsec
Only through IP networks
Provides integrity, confidentiality, SYSTEM authentication
S-HTTP
Used to encrypt individual messages between two computers
Zero Knowledge proof
Proving that you have a specific key without sharing that key or showing it to anyone
Transposition cipher
Rearranging characters
Substitution cipher
Exchanging characters
DES
Algorithm: Data Encryption Algorithm (64bit)
(name changed from Lucifer (128bit))
Block cipher
Symmetric
64bit key (8 bit for parity, so true key is 56 bit)
AES
Advanced Encryption Algorithm
Using rijndael algorithm
Used to bulk encrypt data
Symmetric
PGP
Pretty good privacy
Hybrid symmetric/asymmetric free crypto system
SET
Secure electronic transaction
Supposed to replace SSL
Developed by MasterCard and Visa
Too much overhead = not adopted
Block cipher
Using substitution boxes (s-boxes) For bulk data Fixed length grp of bits Symmetric Substitution and permutation DES, AES, IDEA, RC5, BLOWFISH ECB - electronic code book (encrypt CC numbers) CBC - cipher block chaining (encrypt documents) CFB - cipher feedback mode OFB - output feedback CTR - counter mode
IDEA
128bit
Block cipher
64bit block, broken into 16subblocks and send trough 8 rounds of permutation
- meant to replace DES, but patented and requiring license fees
Link encryption
Encrypts everything but data link messaging
Working in datalink and physical layer of OSI model
HMAC
Massage authentication code
Symmetric key is added to the message and result put through hashing algorithm = MAC
- integrity
- system or data authentication
CBC-MAC
Using block cipher to create MAC, which is the last block of cipher text
Only integrity
RSA
Asymmetric
Data encryption, key exchange, digital signature
Rivest - Shamir - Adleman
- based on difficulty to factor large numbers into their original prime numbers