Cryptography Flashcards

1
Q

Plaintext

A

An unencrypted message

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Ciphertexxt

A

An encrypted message

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Symmetric Encryption

A

Uses one key to encrypt and decrypt

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Asymmetric Encryption

A

Uses separate keys to encrypt/decrypt

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Hash Function

A

One-way encryption using an algorithm and has no key

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Permutation

A

Also called transposition, provides diffusion by rearranging the characters of the plaintext anagram-style.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Substitution

A

Replacing one character for another - provides “confusion”

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Work Factor

A

How long it will take to break a cryptosystem.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Monoalphabetic and Polyalphabetic Ciphers

A

Monoalphabetic ciphers use one alphabet. The same substitution is used for each replacement. Polyalphabetic uses multiple alphabets so the same replacement is not repeated each time. Monoalphabetic ciphers are susceptible to frequency analysis.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Vigenere Square Encryption

A

A polyalphabetic technique

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

One-time Pad

A

Substitution cipher uses identical paired pads of random characters - user modular adidition

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Stream and Block Ciphers

A

Used for symmetric encryption. Stream mode encrypts bit by bit. Block mode ciphers encrypt blocks of data each round. e.g. DES uses 56 bits at a time.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Initialization Vectors

A

Used in soe symmetric ciphers to ensure the first encrypted block of data is random. Ensures that identical plaintexts encrypt to different ciphertexts.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Chaining

A

Also called, “feedback”. Seeds the previous encrypted block into the next block to be encrypted. Used to avoid patterns in results ciphertexts.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

DES

A

Data Encryption Standard, describes the “Data Encryption Algorithm (DEA)”. U.S Federal standard for symmetric cipher in 1976.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

DES Modes (5)

A
  1. Electronic Code Book (ECB)
  2. Cipher Block Chaining (CBC)
  3. Output Feedback (CFB)
  4. Output Feedback (OFB)
  5. Counter Mode (CTR)
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

ECB

A

DES Electronic Codebook - weakest mode. Does not use initialization vector or chaining. May leave patterned ciphertext.

18
Q

CBC

A

Cipher Block Chaining (DES). Uses block mode that XORs the previous ciphertext block to the next block of plaintext to be encrypted. Uses initialization vector. Weakness is possible block error propagation.

19
Q

CFB

A

Cipher Feedback (CFB). Similar to CBC but uses stream mode and chaining to destroy patterns. Uses initialization vector.

20
Q

OFB

A

Output Feedback (OFB). Variation of CFB.

21
Q

Trible DES

A

Became recommended standard in 1999. Applies DES encryption three times per block. “Encrypt Decrypt Encrypt”

22
Q

IDEA

A

International Data Encryption Algorithm. symmetric block cipher designed to replace DES. User 128-bit key and 64-bit block size.

23
Q

AES

A

Advanced Encryption Standard. Current U.S. standard for symmetric block cipher. Uses 128, 192 or 256 keys.

24
Q

Diffie-Hellman

A

Asymmetric Encryption. Developed RSA (Rivest, Shamir and Adleman) algorithm in 1977.

25
Q

ECC

A

Elliptic Curve Cryptography. Asymmetric uses one-way function using elliptic curves.

26
Q

Hash Functions

A

Provides encryption using an algorithm with no key. One-way hash functions because there is no way to reverse the encryption. A variable length plaintext is hashed into a fixed length ciphertext. referred to as a Message Digest or simply a “hash”.

27
Q

MD5

A

Hashing algorithm (Rivest). Creates a 128-bit hash (16 bytes).

28
Q

Collisions

A

Hashes are NOT unique. The number of possible plaintexts significantly outnumber the possible 128-bit ciphertexts. So, mathematically, collisions are possible.

29
Q

SHA

A

Secure Hash Algorithm.

  1. SHA-1 (1993): uses 160-bit hash value
  2. SHA-2: uses 335, 256, 384 and 512 bit digests.
30
Q

Brute Force

A

Tries every possible variation of plaintext. Given enough time, will always be successful.

31
Q

Meet in the Middle Attack

A

2DES uses Encrypt-Encrypt order. Attacker has both plaintext and ciphertext. Uses to recover the encryption key.

32
Q

Differential Cryptanalysis

A

Known Plaintext attack. Uses statistical analysis to search for signs of non-randomness in the ciphertexts.

33
Q

Linear Cryptanalysis

A

Known Plaintext attack. Analyst finds large amounts of plaintext/ciphertext pairs created with the same key.

34
Q

Side Channel Attacks

A

Uses physical data to break a cryptosystem. For example, by monitoring CPU cycles or power consumption used while encrypting or decrypting.

35
Q

Implementation Attacks

A

Exploiting a mistake made while implementing an application, service or system. For example, not destroyed plaintext temp files.

36
Q

Birthday Attack

A

Uses the “birthday problem” in probability theory

37
Q

PKI

A

Public Key Infrastructure. Uses all three forms of encryption to provide and namange digital certificates. A digital certificate is a public key signed with a digital signature.

38
Q

X.509

A

Standard digital certificate format.

  1. Certificate Authorities (CA) issue and revoke certificates
  2. Organizational Registration Authorities (ORA( vouch for the binding between public keys and certificate holder identities and other attributes
  3. Certificate holders that are issues certificates and can sign digital documents
  4. Clients that validate digital signatures and their certification paths from a know public key of a trusted CA
  5. Repositories that store and make available certificates and certificate revocation lists (CRLs)
39
Q

SSL

A

Secure Sockets Layer - authenticates and provides confidentiality to web traffic.

40
Q

GLS

A

Transport Layer Security. Successor to SSL.

41
Q

IPSec

A

Internet Protocol Security - a suite of protocols used with IPv4 and IPv6. Used from VPNs.

Uses two primary protocols:

  1. Authentications Header (AH)
  2. Encapsulating Security Payload (ESP)
42
Q

S/MIME

A

Used to encrypt and authenticate email messages.