Cryptography Flashcards

1
Q

FIPS

A

Federal information Processing Standard (FIPS)

approves cryptographic for use.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

A possible key length for the Advanced Encryption Standard Rijndael cipher?

A

128, 192, or 256 bits

The Rijndael cipher allows users to select a key length of 128, 192, or 256 bits, depending on the specific security requirements of the application.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

frequency analysis attack

A

The Caesar cipher

The Caesar cipher (and other simple substitution ciphers) are vulnerable to frequency analysis attacks that analyze the rate at which specific letters appear in the ciphertext.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Data Encryption Standard (DES) operating modes

A

Cipher Block Chaining (CBC)

Electronic Code Book (ECB) –> is not suitable for large amounts of data.

Cipher Feedback (CFB)

Output feedback (OFB) –> prevents early errors from interfering with future encryption/decryption.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Which AES finalist makes use of prewhitening and postwhitening techniques?

A

The Twofish algorithm, developed by Bruce Schneier, uses prewhitening and postwhitening.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

the only known cryptosystem that is not vulnerable to attacks?

A

the one-time pad

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

block size is used by the 3DES encryption algorithm

A

3DES simply repeats the use of the DES algorithm three times. Therefore, it has the same block length as DES: 64 bits.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

a key escrow system that requires multiple people to retrieve a key but does not depend on every participant being present

A

M of N Control requires that a minimum number of agents (M) out of the total number of agents (N) work together to perform high-security tasks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Symmetric Cryptography

A
DES / 3DES
Blowfish
Skipjack
Twofish
AES

Uses a Shared Key that needs escrow.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Which key should I use?

A

To encrypt a message = recipients public key
To decrypt a message = your private key

To digitally sign a message = your private key

To verify a digital signature = senders public key

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Email Security

A

Confidentiality = encrypt the message

To maintain integrity = hash the message

Email needs authentication, integrity and / or nonrepudiation = digitally sign the message

Email needs the kitchen sink = digitally sign + hash

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Hashing vs Encryption

A

Encryption is the process of converting a normal readable message known as plaintext into a garbage message or not readable message known as Ciphertext. The ciphertext obtained from the encryption can easily be transformed into plaintext using the encryption key. Some of the examples of encryption algorithms are RSA, AES, and Blowfish.

Hashing is the process of converting the information into a key using a hash function. The original information cannot be retrieved from the hash key by any means. Generally, the hash keys are stored in the database and they are compared to check whether the original information matches or not.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

IPSec components

A

Authentication Header (AH) = assurance of message integrity and nonrepudiation.

Encapsulating Security Payload (ESP) = provides confidentiality and integrity of packet contents.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

IPSec Modes of Operation

A

Transport Mode = ony the packet payload is encrypted

Tunnel Mode = the entire packet, including header, is encrypted

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Digital Signature Standard

A

Gov / NIST
FIPS 186-4

Federally approved algorithms must use the SHA-3 hashing functions.

DSA
RSA
Elliptic Curve

SHA-2

The Digital Signature Standard allows federal government use of the Digital Signature Algorithm, RSA, or the Elliptic Curve DSA in conjunction with the SHA-1 hashing function to produce secure digital signatures.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

3 Major Public Key Cryptosystems

A

RSA
El-Gamal
Elliptic Curve

17
Q

Which cryptographic algorithm forms the basis of the El Gamal cryptosystem?

A

A. RSA
B. Diffie-Hellman
C. 3DES
D. IDEA

The El Gamal cryptosystem extends the functionality of the Diffie-Hellman key exchange protocol to support the encryption and decryption of messages.

18
Q

Which of the following cipher algorithms uses the longest key?

A. One-time pad cipher
B. Caesar cipher
C. Vigenère cipher
D. Columnar transposition cipher

A

The one-time pad uses a key that is equal in length to the message. All of the other algorithms use keys that are shorter than the message.

19
Q

Cryptography Groups

A

Hashing = MD2, 4, 5 || SHA-1, 2…512

Asymmetric =

Symmetric

Block Ciphers

20
Q

Flo and Ricky are sending messages to each other using an asymmetric encryption algorithm. Flo wants to send Ricky a private message. What key should she use to encrypt it?

A. Flo’s public key
B. Flo’s private key
C. Ricky’s public key
D. Ricky’s private key

A

Flo should encrypt the message with Ricky’s public key.

21
Q

Bob received a message from David that was encrypted with an asymmetric algorithm. What key should he use to decrypt it?

A. Bob’s public key
B. Bob’s private key
C. David’s public key
D. David’s private key

A

B

The recipient of a message encrypted using asymmetric cryptography decrypts it with their own private key.

22
Q

What type of attack can be used against cryptographic algorithms that do not incorporate temporal protections?

A. Chosen plain-text attack
B. Meet-in-the-middle attack
C. Man-in-the-middle attack
D. Replay attack

A

D

23
Q

Richard received an encrypted message sent to him from Sue. Which key should he use to decrypt the message?

A. Richard’s public key
B. Richard’s private key
C. Sue’s public key
D. Sue’s private key

A

B
Sue would have encrypted the message using Richard’s public key. Therefore, Richard needs to use the complementary key in the key pair, his private key, to decrypt the message.

24
Q

Richard wants to digitally sign a message he’s sending to Sue so that Sue can be sure the message came from him without modification while in transit. Which key should he use to encrypt the message digest?

A. Richard’s public key
B. Richard’s private key
C. Sue’s public key
D. Sue’s private key

A

B
Richard should encrypt the message digest with his own private key. When Sue receives the message, she will decrypt the digest with Richard’s public key and then compute the digest herself. If the two digests match, she can be assured that the message truly originated from Richard.

25
Q

Cryptography four fundamental goals

A
  1. integrity –> data is not altered
  2. confidentiality –> data remains private 1. at rest, 2. in transit, 3. in use
  3. non repudiation –>
  4. authentication –> verifies the claimed identity
26
Q

If Richard wants to send an encrypted message to Sue using a public key cryptosystem, which key does he use to encrypt the message?

A. Richard’s public key
B. Richard’s private key
C. Sue’s public key
D. Sue’s private key

A

C
Richard must encrypt the message using Sue’s public key so that Sue can decrypt it using her private key.

If he encrypted the message with his own public key, the recipient would need to know Richard’s private key to decrypt the message.

If he encrypted it with his own private key, any user could decrypt the message using Richard’s freely available public key.

Richard could not encrypt the message using Sue’s private key because he does not have access to it. If he did, any user could decrypt it using Sue’s freely available public key.

27
Q

The three most common Public Key (PKI) cryptosystems in use today

A

RSA —> 1024 bits&raquo_space; large prime numbers

Elliptic Curve –> 160 bits

El Gamal –> 1024 bits&raquo_space; diffie hellman&raquo_space; but doubles length of any message it encrypts

28
Q

Common Hashing Algorithms

A

MD2 = Message Digest X
MD4
MD5

HAVAL (MD5 mod)

SHA = Secure Hash Algo –> 1, 2, 3 –> Gov Standard (NIST)

HMAC

29
Q

Digital Signature vs Message Digest

how it works

A

Alice and Bob got pairs of key (𝐴𝑝𝑢𝑏, 𝐴𝑝𝑟𝑖𝑣), (𝐵𝑝𝑢𝑏, 𝐵𝑝𝑟𝑖𝑣).

Alice knows 𝐵𝑝𝑢𝑏 and Bob knows 𝐴𝑝𝑢𝑏.

Alice wants to send a message 𝑚 to Bob ⟹ She encrypts it with 𝐵𝑝𝑢𝑏.

Alice wants to prove to Bob that it was she who sent the message ⟹ She signs it with her private key 𝐴𝑝𝑟𝑖𝑣.

Problem: signing and encryption using RSA (standard procedure) is slow. How to speed up the process ?

Alice encrypts the message with a symmetric cipher (AES) using a random generated key 𝐾𝑠𝑦𝑚. Then, encrypt 𝐾𝑠𝑦𝑚 with the 𝐵𝑝𝑢𝑏.

Alice does not sign the message, she signs the message digest. Smaller therefore faster.

Alice hashes the message 𝑚 ⟹ she gets the message digest.

𝐻(𝑚)→𝑀𝐷.

Alice signs 𝑀𝐷 with her private key.

𝐸𝐴𝑝𝑟𝑖𝑣(𝑀𝐷)→𝑆𝑖𝑔.

Alice generates a random key for the symmetric encryption.

𝑟𝑑𝑚()→𝐾𝑠𝑦𝑚

Alice encrypts the message and the signature with a symmetric cypher.

𝐸𝐾𝑠𝑦𝑚(𝑚‖𝑆𝑖𝑔)→𝑐

Alice encrypts the symmetric key with Bob’s public key.

𝐸𝐵𝑝𝑢𝑏(𝐾𝑆𝑦𝑚)→𝐾𝑐𝑖𝑝ℎ𝑒𝑟

Alice sends (𝑐,𝐾𝑐𝑖𝑝ℎ𝑒𝑟) to Bob.

Remark: It is a good practice to have 2 pairs of keys : one for encryption, one for signatures.

30
Q

Four rules of PKI and Digital Signatures

A

Encrypt a message –> use recipients Public Key

Decrypt a message –> use YOUR Private Key

Digitally Sign a message you’re sending to someone else –> use YOUR Private Key

Verify signature on message sent by someone else –> use senders Public Key

31
Q

Digital Signature Standard (DSS)

A

NITS sets this standard.

FIPS 186-4, AKA Digital Signature Standard (DSS)

DSS = federally approved

  1. DSA
  2. RSA
  3. Elliptic Curve DSA (ECDSA)
32
Q

Email Security

A

confidentiality = encrypt the message

integrity = hash the message

confidentiality + integrity + auth + norepudiation = encrypt + digitally sign

33
Q

S/MIME

A

uses RSA

x.509 for key exchange

34
Q

Link Encryption =

End to end =

A

link = secure tunnel between two points > encrypts ALL traffic

end to end = protects between two point > SSH

35
Q

E

A
36
Q

Which one of the following Data Encryption Standard (DES) operating modes can be used for large messages with the assurance that an error early in the encryption/decryption process won’t spoil results throughout the communication?

A. Cipher Block Chaining (CBC)
B. Electronic Code Book (ECB)
C. Cipher Feedback (CFB)
D. Output feedback (OFB)

A

Output feedback (OFB) mode prevents early errors from interfering with future encryption/decryption.
Cipher Block Chaining and Cipher Feedback modes will carry errors throughout the entire encryption/decryption process.
Electronic Code Book (ECB) operation is not suitable for large amounts of data.

37
Q

Which one of the following algorithms is not supported by the Digital Signature Standard?

A. Digital Signature Algorithm
B. RSA
C. El Gamal DSA
D. Elliptic Curve DSA

A

The Digital Signature Standard allows federal government use of the Digital Signature Algorithm, RSA, or the Elliptic Curve DSA in conjunction with the SHA-1 hashing function to produce secure digital signatures.

38
Q

Dave is developing a key escrow system that requires multiple people to retrieve a key but does not depend on every participant being present. What type of technique is he using?

A. Split knowledge
B. M of N Control
C. Work function
D. Zero-knowledge proof

A

M of N Control requires that a minimum number of agents (M) out of the total number of agents (N) work together to perform high-security tasks

39
Q

Which of the following can be used securely even when no preexisting secure form of communication exists between the two parties?

A. AES
B. RSA
C. IDEA
D. RC5

A

RSA is an example of asymmetric cryptography, which does not require a preexisting relationship to provide a secure mechanism for data exchange. Two individuals can begin communicating securely from the moment they start communicating.