Cryptography Flashcards
Confidentiality
Only authorized parties can access data.
Integrity
Verifying data has not been altered in transit.
Authentication
Verifying the sender is who they say they are.
Non-Repudiation
Prevents one party from denying actions they carried out.
Cryptography
“Science of secret writing”
Cryptanalysis
Study and practice of finding weaknesses in ciphers
Algorithm
“Formulas to encrypt data”
Cipher
Method used to encode characters to hide their value
Plain Text/Clear Text
Info which is transferred or stored without crypto protection
Cipher text
Result of encryption performed on plaintext using an algorithm.
Substitution Cipher
One character or symbol into another
Substitution Code
Substitution at the level of words or phrases
Transposition
Changing the positions of plaintext letters within a sentence.
eg. meet me at noon = noontaemteem
Exclusive-OR (XOR) Operation
Binary mathematical operation
If values are the same = 0
If values are different = 1
Used in One-Time Pad
One-Time Pad
Considered Unbreakable
3 Requirements:
- Made up of truly random values and used only once
- Must be at least as long as the message
- Securely distributed to destination and protected at sender’s and receiver’s sights.
Cons: More overhead, needs to be received in a secure fashion, sender/receiver must be perfectly synched.
Frequency Analysis
Study of the frequency of letters or groups of letters in a cipher text.
Eg. Wheel of Fortune
Initialization Vectors
Random values used with algorithms to ensure patterns are not created during encryption process.
Not encrypted when being sent
Used in WEP
Steganography
Electronic Watermarking
Hiding one’s message in another in order to prevent it from being detected.
Graphics/Sound Files
ADS
Alternate Data Streams
Adds a program on to another to help it work across multiple platforms.
Can be used for evil.
Eg. Drive in movie with someone in the trunk.
Quantum Cryptography
Message is sent in a series of photons. Receiver must know sequence and polarity of photons to decode message.
If someone intercepts, some of the photons will change polarity and message will be altered.
Hashing
Used for Integrity
One-way encryption function. Takes variable-length input and makes a fixed-length output.
Hash collision happens when different inputs create the same hash value. Collision detection prevents this.
MD5
Message Digest 5
Hash Function (Cisco)
Digest Size: 128 bits
SHA-1
Secure Hashing Algorithm
Hash Function
Digest Size: 160 bits
SHA-2/SHA-224/256
Secure Hashing Algorithm
Hash Function
Digest Sizes: 224, 256 bits
SHA-2/SHA-384/512
Secure Hashing Algorithm
Hash Function
Digest Size: 512 bits
RIPEMD-160
Hash Function
Digest Sizes: 128, 160, 256, 320 bits
HAVAL
Hash Function
Digest Sizes: 128, 160, 192, 224, 256 bits
Whirlpool
Hash Function
Digest Size: 512
Brute Force Attacks
Applying every possible combination of characters that could be the key.
Time may be a factor/not fast enough
Dictionary Attack
Uses dictionary of common words (to include proper nouns)
Rainbow Table/Crack
Uses a lookup table comprised of pre-calculated hash from common words.
Birthday Attack
Probability that someone has the same hash that attacker has already figured out.
SALT
Randomly generated value that is calculated into the hashing process
eg. Table Salt
MAC
Message Authentication Code
Verifies integrity and origin
Symmetric Key
HMAC
Hashed Message Authentication Code
Hash function added to MAC
Adds symmetric key to data to be hashed.
Used in IPSec, SSL/TLS, SSH
Symmetric Cryptography
- Uses one key to encrypt/decrypt info
- Both parties share same key
- Best for bulk encryption; faster (smaller key) than asymmetric
- AKA: secret key, private key, shared key, same key, single key, session key
Stream Cipher
Symmetric Encryption Method
- Bit by bit
- Keystream
- Hardware
- No memory
- On-the-fly
- Very fast
Block Cipher
Symmetric Encryption Method
- Software
- Fixed-length blocks
- Block-by-block
- Uses substitution/transposition ciphers
- Stronger than stream-based
- Slow/resource intensive
Symmetric Encryption Methods
Stream Cipher and Block Cipher
Pros:
- Less computationally intensive
- Produces smaller file size
- Faster transmissions
Cons:
- Key distribution security
- Needs to be trust between parties
- Key management (n(n-1)/2=# keys needed
- No “non-repudiation”
Symmetric Key Algorithms
C - CAST 3 - 3DES 2 - Twofish B - Blowfish R - RC4, 5, 6 A - AES I - IDEA D - DES S - SAFER (+, ++)
DES
Data Encryption Standard/Symmetric
Based on IBM’s Lucifer algorithm
64-bit Block (56-bit key + 8 bits for parity)
Algorithm: DEA (Data Encryption Algorithm)
Easily Broken