Cryptography Flashcards

1
Q

Cryptanalysis

A

Study and methods used to crack encrypted communications

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Cryptography

A

The science or study of protecting information whether in transit or at rest by using techniques to render the information unusable to anyone who does not possess the means to decrypt it.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Plain text

A

Something you can read

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Cipher text

A

Plain text turned into something that cannot be read unless you have the proper key

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Linear Crypt-analysis

A

Linear - take blocks of encrypted text and compare them to blocks of the unencrypted text line by line. Works best on block ciphers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Differential Crypt-analysis

A

Applicable to symmetric keys, compares differences in inputs to how each one affects the outcome

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Integral Crypt-analysis

A

Input vs output comparison running multiple computations of the same block size input

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Nonrepudiation

A

The means by which a recipient can ensure the identity of the sender and neither party can deny having sent or received the message.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Algortithm

A

Step by step method of solving a problem. Encryption algorithms are mathematical formulas used to encrypt and decrypt data. Encryption algorithms are also known as ciphers.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Encryption of bits methods

A

Substitution - bits are replaced by other bits

Transposition - changes the order of the bits

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Stream cipher

A

Bits are encrypted as a continuous stream, one at a time, normally using an XOR function. These work at a very high rate of speed.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Block cipher

A

Data bits are split into blocks (commonly 64 bits at a time) and each block is encrypted with the key. Normally uses substitution and transposition in the algorithm. Slower than stream ciphers.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

XOR (Exclusive OR)

A

0 XOR 0 = 0
0 XOR 1 = 1
1 XOR 0 = 1
1 XOR 1 = 0

If the two bits match, the result is a 0 and if they don’t match the result is a 1.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Key length

A

If the key chosen is smaller than the data, the cipher will be vulnerable to frequency attack because the key will be used repeatedly in the process.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Symmetric Encryption

A

Also known as single key which both encrypts and decrypts. Good for bulk encryption because it is fast but key distribution is an issue. Encryption only, does not provide for integrity (nonrepudiation)
DES - block cipher uses a 56 bit key - not considered secure
3DES - block cipher uses a 168 bit key with up to 3 keys, Slower than DES but more secure
AES - block cipher that uses a key length of 128, 192 or 256 bits. Faster than DES and 3DES
IDEA - block cipher that uses a 128 bit key. Used in PGP and Europe
Twofish - block cipher that uses a key size up to 256 bits
Blowfish - block cipher uses a 64 bit block size and a key from 32 to 448 bits. Considered public domain
RC series: RC2 to RC6 - block ciphers that uses variable key length up to 2040 bits
RC4 - is a stream cipher
RC5 - variable block sizes (32, 54,128) and 2-bit working registers
RC6 - uses 128 bit blocks and 4-bit working registers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

N(N-1)/2

A

To calculate the number of keys you need to communicate with N devices.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Asymmetric Encryption

A

Key pairs - public and private - what one key encrypts, the other key decrypts. Can also be used for integrity via hashing algorithm, What one key signs, the other key can verify the signature as valid. Slower than symmetric and is suitable for small amounts of data.
Diffie-Hellman - a key exchange protocol used in SSL and IPSEC. Vulnerable to man in the middle attacks
Elliptic Curve Cryptosystem (ECC) - uses points on an elliptical curve in conjunction with logarithms for encryption and signatures. Uses less processing power so good for mobile devices
El Gamal - Solving of discreet logarithm problems
RSA - Uses primer numbers with key sizes up to 4096 bits.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Hash Algorithm

A

One-way mathematical function takes a variable length input and generates a fixed length message digest that acts as a signature for that data.
MD5 - 128 bits - considered insecure
SHA-1 - 160 bits - replaced by SHA-2 due to security concerns
SHA-2 - can product 224, 256, 384 and 512 bit hashes. Not widely used
SHA-3 - uses sponge construction
RIPEMD-# where the # indicates the bit length -works through 80 stages

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Hashing Attacks

A

Collision attack - when two or more different inputs result in the same identical message digest (hash)

20
Q

Don’t Use Hard Coded Keys (DUHK) attack

A

A vulnerability that allows attackers access to keys in certain VPNs. Affects devices using the ANSI X9.31 random number generator in conjunction with a hard coded seed key

21
Q

Rainbow table

A

Pre-computed list of hashes that can speed up the cracking of hashed data (signature, password, etc)

22
Q

Salt

A

Collection of random bits added to an encryption algorithm making a collision attack difficult (and rainbow tables).

23
Q

Key Escrow

A

Copies of keys stored for later use by a third party

24
Q

Steganoagraphy

A

Concealing a message inside of another medium

25
Q

How to tell if a file has been steggoed?

A

For text, character positions are key (look for text patterns, unusual blank spaces and language anomalies). Image files will be larger in size and may show weird color palette faults. Audio and video files require statistical analysis.

26
Q

Image Steganography

A

Least significant bit insertion
Masking and filtering - on gray scale images, modifying the luminescence of data parts
Algorithmic transformation - hide data in the mathematical functions used in image compression

27
Q

Steganography Tools

A
Omnihidepro, 
Masker - sticking messages into the video stream
Deepsound,
MP3stego - insert messages in audio files
Other tools: QuickStego, 
gifshuffle, 
SNOW, 
SteganographyStudio, 
OpenStego
28
Q

Registration Authority

A

Issue certificates. Usually a subordinate CA as root CAs are placed offline for security purposes.

29
Q

Trust model in PKI

A

Describes how entities within an enterprise deal with keys, signatures and certificates,
Web of Trust - entities sign certificates for one another
Single authority system - has a single CA at the top that acts as the sole registration authority
Hierarchical Trust System - has a Root CA and subordinates. The subordinates are the registration authority. Most secure of the three models.

30
Q

X.509 certificate

A
Version
Serial Number
Subject
Algorithm ID (signature algorithm)
Issuer - who created the certificate
Validity dates
Key usage
Subject's Public Key
Optional Fields
31
Q

Self-signed certificate

A

Signed by the same identity whose identity it certifies

32
Q

FIPS 186-2

A

Digital Signature Algorithms (DSA) - Federal Information Processing Standard

33
Q

Full disk encryption

A
Protect data on mobile devices or portable devices with a key needed to unlock the drive at boot
Microsoft Bitlocker, 
McCafee endpoint protection, 
Symantec Drive encryption, 
Gilisoft Full Disk Encryption
34
Q

Boot n Root attack

A

Booting from USB and a different OS to get access to a hard drive’s data

35
Q

File and folder encryption tools

A

Microsoft EFS
Veracrypt
AxCrypt
GNU Privacy Guard

36
Q

Encrypted Communication

A

Secure Shell (SSH) - a secured version of Telnet over port 22, relies on public key cryptography, can be used as a tunneling protocol,
SSH2 - more secure than SSH, includes SFTP a secure version of FTP
SSL - encrypts data at the transport layer. Uses RSA encryption and digital certificates. Being replaced by TLS - RSA algorithm of 1024 and 2048 bits, allows both the client and server to authenticate to each other
IPSEC - network layer tunnelling protocol. AH provides for integrity, ESP for encryption (transport mode the header is not encrypted, tunnel mode the entire packet is encrypted with a new header that adds the tunnel endpoints)
PGP - used for signing, compression and encrypting and decrypting emails, files, directories, and disk partitions. PGP is a hybrid cryptosystem

37
Q

SMIME

A

Standard for public key encryption and signing of MIME data (emails).

38
Q

SSL attacks

A

Heartbleed was a vulnerability in OPENSSL can be detected with NMAP
Poodle - vulnerability related to backward compatibility where sites revert back to SSL instead of using TLS. Disable use of SSLV3.0 to mitigate and implement TLS_FALLBACK_SCSV (a fake cipher suite). Also known as PoodleBleed
FREAK - man in the middle attack that forces a downgrade of an RSA key to a weaker length. Can lead top RC4 bias attacks
DROWN - HTTPS attack that allows attackers to break the encryption and read or steal sensitive communications include passwords, credit cards,trade secrets, and financial data. Disable use of SSLv2

39
Q

Cryptography Attack - Known Plain-Text Attack

A

The attacker has both plain-text and corresponding cipher-text messages - the more the better. The plain text copies are scanned for repeatable sequences.

40
Q

Cryptography Attack - Chosen Plain-Text Attack

A

The attacker encrypts multiple plain-text copies himself in order to gain the key.

41
Q

Cryptography Attack - Adaptive Chosen Plain-Text Attack

A

The attacker makes a series of interactive queries, choosing subsequent plaintexts based on the information from the previous encryptions.

42
Q

Cryptography Attack - Cipher-text-only Attack

A

Using statistical analysis on messages encrypted using the same algorithm.

43
Q

Cryptography Attack - Replay Attack

A

Performed via man-in the-middle. Session tokens can be used to mitigate

44
Q

Cryptography Attack - Chosen Cipher Attack

A

Attempts to discern the key through comparative analysis. RSA is vulnerable to this.

45
Q

Cryptography Attack - Side Channel Attack

A

A physical attack that monitors environmental factors like power consumption, timing, and delay on the cryptographic system itself.

46
Q

Cryptography Attack - Inference Attack

A

Deriving information from the cipher text without actually decoding it.

47
Q

Cracking Tools

A
Carnivore
Magic Lantern
L0phtcrack
John the Ripper
PGPCrack
Cryptool
Cryptobench
Jipher