Cryptography Flashcards
Cross-certification
used to establish trust between different PKIs and build an overall PKI hierarchy.
Cross certification allows users to validate each other’s certificate when they are certified under different certification hierarchies.
Cross certification does not check the authenticity of the certificates in the certification path.
certification path validation
check the authenticity of the certificates in the certification path
What are the three main issues with key management?
key recovery, key storage, and key change
Which key should you use to ensure confidentiality of an e-mail message?
the receiver’s public key
What are the three purposes of ElGamal?
digital signatures, encryption of data, and key exchange
What does a digital signature provide?
non-repudiation for e-mail
Which security standard sets security standards for hardware and software cryptographic modules?
FIPS-140
To which type of attack is the Diffie-Hellman algorithm susceptible?
man-in-the-middle attacks
What is contained within an X.509 CRL?
a list of serial numbers of unexpired or revoked digital certificates that should be considered invalid
AES - MixColums
provides diffusion by mixing the columns of the state via finite field mathematics.
AES - SubRows
provides diffusion by shifting rows (row of blocks) of the state.
AES - SubBytes
provides confusion by substituting the bytes of the state.
AES - AddRoundKey
is the final function applied in each round. It XORs the state with the subkey.
Electronic Code Book (ECB)
- is the simplest and weakest form of DES.
- Block mode
- It uses no initialization vector or chaining.
- Each block is encrypted independently.
- Two plaintexts with partial identical portions (such as the header of a letter) encrypted with the same key will have partial identical ciphertext portions.
- Used in small amount of data such as ATM PINS.
Cipher Feedback (CFB)
- a stream mode (usually 8-bits). The first 8 bits that come from the algorithm are then XORed with the first 8 bits of the plaintext (the first segment).
- Each 8-bit segment is then transmitted to the receiver and also fed back into the shift register.
- It uses feedback (the name for chaining when used in stream modes) to destroy patterns.
- Like CBC, CFB uses an initialization vector and destroys patterns, and errors propagate.
Cipher Block Chaining (CBC)
- a block mode that XORs the previous encrypted block of ciphertext to the next block of plaintext to be encrypted.
- The first encrypted block is an initialization vector.
- This “chaining” the result of encrypting one block of data is fed back into the process to encrypt the next block of data.
- This “chaining” destroys patterns and encryption errors will propagate
Output Feedback (OFB)
- A stream mode of DES that uses portions of the key for feedback.
- errors will not propagate.
- This does pose some storage complications, especially if it were to be used in a high-speed link.
Counter (CTR) mode
- a counter—a 64-bit random data block—is used as the first IV for feedback.
- every subsequent block, the counter is incremented by
- The counter is then encrypted just as in OFB, and the result is used as a keystream and XORed with the plaintext.
Because the keystream is independent from the message, it is possible to process several blocks of data at the same time, thus speeding up the throughput of the algorithm. - used in high-speed applications such as IPSec and ATM.
principal
any entity that possesses a public key
verifier
an entity that verifies a public key chain.
subject
an entity that seeks to have a certificate validated.
Trust anchor
is a public key that verifies the certificate used in a digital signature.
Symmetric algorithms
DES, 3DES, IDEA, Blowfish, Twofish, RC4, RC5, RC6, Advanced Encryption Standard (AES), SAFER, and Serpent
Asymmetric algorithms
Diffie-Hellman, RSA, ElGamal, Elliptic Curve Cryptosystem (ECC), LUC, Knapsack, and Zero
Hash collision
creates an identical hash for two different plaintext.
Simple Key-management for Internet Protocols (SKIP)
a key distribution protocol such as the Diffie-Hellman algorithm, which uses hybrid encryption to convey session keys that are used to encrypt data in IP packets.
SKIP is similar to SSL, except that it requires no prior communication in order to establish or exchange keys on a session-by-session basis.
Rijndael
a symmetric block cipher algorithm that uses variable block lengths and variable key lengths. It supports 128, 192, and 256 bits.
How PGP provides secrity ?
o Confidentiality through the International Data Encryption Algorithm (IDEA) (symmetric).
o Integrity through the MD5 hashing algorithm.
o Authentication through public key certificates.
o Nonrepudiation through encrypted signed messages.
What is Collision?
Two or more plaintexts that generate the same hash.
What is Collusion?
An agreement between two or more individuals to subvert the security of a system.
S/MIME
Secure/Multipurpose Internet Mail Extensions—Leverages PKI to encrypt and authenticate MIME-encoded email.
SIGABA
Rotor machine used by the United States through World War II into the 1950s.
Purple
Allied name for the stepping-switch encryption device used by Japanese Axis powers during World War II.
Engima
Rotor machine used by German Axis powers during World War II.
Known-plaintext
the attacker has access to both the ciphertext and the plaintext versions of the same message to find the key.
Chosen-plaintext attack
the attacker knows the algorithm used or have access to the machine used to determine the key.
Adaptive-chosen plaintext
attacker can modify the chosen input files to see what effect that would have on the resulting ciphertext.
Chosen-ciphertext attacks
cryptanalyst chooses the ciphertext to be decrypted with the help of a decryption oracle.
Usually launched against asymmetric cryptosystems, where the cryptanalyst may choose public documents to decrypt that are signed (encrypted) with a user’s public key.
Adaptive-chosen ciphertext
begins with a chosen ciphertext attack in round 1. The cryptanalyst then “adapts” further rounds of decryption based on the previous round.
ciphertext-only attack
to discover the encryption key by gathering multiple encrypted messages and then trying to deduce a pattern from the encrypted messages