Cryptography Flashcards
FIPS
Federal information Processing Standard (FIPS)
approves cryptographic for use.
A possible key length for the Advanced Encryption Standard Rijndael cipher?
128, 192, or 256 bits
The Rijndael cipher allows users to select a key length of 128, 192, or 256 bits, depending on the specific security requirements of the application.
frequency analysis attack
The Caesar cipher
The Caesar cipher (and other simple substitution ciphers) are vulnerable to frequency analysis attacks that analyze the rate at which specific letters appear in the ciphertext.
Data Encryption Standard (DES) operating modes
Cipher Block Chaining (CBC)
Electronic Code Book (ECB) –> is not suitable for large amounts of data.
Cipher Feedback (CFB)
Output feedback (OFB) –> prevents early errors from interfering with future encryption/decryption.
Which AES finalist makes use of prewhitening and postwhitening techniques?
The Twofish algorithm, developed by Bruce Schneier, uses prewhitening and postwhitening.
the only known cryptosystem that is not vulnerable to attacks?
the one-time pad
block size is used by the 3DES encryption algorithm
3DES simply repeats the use of the DES algorithm three times. Therefore, it has the same block length as DES: 64 bits.
a key escrow system that requires multiple people to retrieve a key but does not depend on every participant being present
M of N Control requires that a minimum number of agents (M) out of the total number of agents (N) work together to perform high-security tasks.
Symmetric Cryptography
DES / 3DES Blowfish Skipjack Twofish AES
Uses a Shared Key that needs escrow.
Which key should I use?
To encrypt a message = recipients public key
To decrypt a message = your private key
To digitally sign a message = your private key
To verify a digital signature = senders public key
Email Security
Confidentiality = encrypt the message
To maintain integrity = hash the message
Email needs authentication, integrity and / or nonrepudiation = digitally sign the message
Email needs the kitchen sink = digitally sign + hash
Hashing vs Encryption
Encryption is the process of converting a normal readable message known as plaintext into a garbage message or not readable message known as Ciphertext. The ciphertext obtained from the encryption can easily be transformed into plaintext using the encryption key. Some of the examples of encryption algorithms are RSA, AES, and Blowfish.
Hashing is the process of converting the information into a key using a hash function. The original information cannot be retrieved from the hash key by any means. Generally, the hash keys are stored in the database and they are compared to check whether the original information matches or not.
IPSec components
Authentication Header (AH) = assurance of message integrity and nonrepudiation.
Encapsulating Security Payload (ESP) = provides confidentiality and integrity of packet contents.
IPSec Modes of Operation
Transport Mode = ony the packet payload is encrypted
Tunnel Mode = the entire packet, including header, is encrypted
Digital Signature Standard
Gov / NIST
FIPS 186-4
Federally approved algorithms must use the SHA-3 hashing functions.
DSA
RSA
Elliptic Curve
SHA-2
The Digital Signature Standard allows federal government use of the Digital Signature Algorithm, RSA, or the Elliptic Curve DSA in conjunction with the SHA-1 hashing function to produce secure digital signatures.