Cryptography Flashcards
What are the 4 fundamental goals of cryptography?
- Confidentiality
- Integrity
- Authentication
- Non repudiation
What is a message called before and after it is encrypted?
Plaintext & cyphertext
What is the Kerchoff principle?
States that a system should be secure even though everything is known.
What is FIPS140-2?
Federal Information Processing Standard. It is the definition for hardware and software requirements for crypto.
Logical AND
Both items need to be true.
Logical OR
v
At least one is true
Logical NOT
~
Inverse
Exclusive OR (XOR)
+
Only one needs to be true
Modulo
%
Remainder
One way function is…
The basis of public crypto systems.
What is a nonce?
Random number that acts as a placeholder for a variable in a formula.
What is the concept of zero knowledge proof?
Ability for a third party to prove knowledge of a password without divulging the password.
Split knowledge can also be called…
Separation of duties.
What is M of N control?
M = minimum number of people needed to divulge. N = Total population of key holders
What is a transposition cipher vs substitution cipher?
rearranging letters vs substituting them
What is a polyalphabetic cipher?
The use of multiple alphabets to encrypt the data.
What is frequency analysis vs period analysis?
Studying the frequency of characters to break an encryption mechanism.
What must be performed to ensure the integrity of a one time pad?
- The one time pad must be truly random.
- Pad must be kept secret and used once.
- Key must be as long as the message.
What is a major obstacle of one time pads?
They are not scalable.
What is a running key cipher?
Cipher is from a known string of characters ie a book.
What is a block cipher vs a stream cipher?
Block operates on a groups of characters at the same time vs stream does one at a time.
What is confusion and what is diffusion?
Confusion - Complication of relationship between plaintext and ciphertext
Diffusion - One change causes additional downstream changes.
What is a symmetric key system and what are its weaknesses
Key is shared amongst others.
Weaknesses: key distribution, scalability, no non-repudiation, new keys needed frequently.
Keys needed (n*(n-1))/2
What is an asymmetric key system and what are its strengths/ weaknesses?
Public/ private key system
Strengths: group changes are less impactful, provided non-repudiation
Weaknesses: slower
Keys needed: n*2
What is DES?
Uses a 64bit block. (56 bit key and 8bit checksum)
What are the 5 modes of DES?
Electronic Code Book (ECB) - Most basic 64 bit block based. Used for small stuff.
Cipher Block Chaining (CBC) - Each block is encrypted with previous block data.
Cipher Feedback (CFB) - Encrypts each block as memory fills.
Output Feedback Mode (OFB) - Like CEB but data is not encrypted with previous block.
Counter Mode (CTR) - like others but seed is from a basic counter.
What is triple DES?
Expansion of DES where text is encrypted 3 times. Keys are either 168 or 112 bits.
What are the characteristics of Blowfish?
Operates on 64bit blocks and keys can range from 32-448 bits.
What are the characteristics of Skipjack?
Operates on 64bit blocks and operates on an 80 bit key and supports key escrow.
What are the characteristics of AES/ Rijndael?
Operates on 128 bit blocks with following key strengths:
128bit - 10 rounds of encryption
192bit - 12 rounds of encryption
256bit - 14 rounds of encryption.
What is Diffie-Helman?
Method of exchanging keys without both parties meeting.
What mistake did the Soviets make during the 1940's using a one time cipher? A. Key values not random B. Key values not long enough C. Key values used multiple times D. Key values were disclosed
A. Key values not random
What is the minimum number of keys in a symmetric system?
One
What DES operating mode can be used for large messages: A. Cipher Block Chaining (CBC) B. Electronic Codebook (ECB) C. Cipher Feedback (CFB) D. Output Feedback (OFB)
D. Output Feedback (OFB)
Many crypto systems rely on the difficulty of factoring the product of large prime numbers. What characteristic is this? A. Diffusion B. Confusion C. One way function D. Kerchoff
C. One way function
What AES function uses pre & post whitening techniques? A. Rijendael B. Twofish C. Blowfish D. Skipjack
B. Two fish