Cryptography 🤝 Flashcards

1
Q

Which security protocol is associated with the names Diffie and Hellman?

A

The Diffie Hellman key exchange.

Two parties securely exchange a common secret over an insecure channel.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Services of Cryptosystems

A

Cryptosystems/ Cryptographic protocols can provide;
Confidentiality
Integrity
Authentication; verify identy.
Authorization ->provide key and access to data resource.
Nonrepudiation; sender cannot deny having sent message/request.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Cryptography

A

Cryptography is the science of secret writing with the goal of hiding the meaning of a message.

Cryptanalysis is the science of breaking cryptography. Cryptology covers both cryptography and cryptanalysis.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What four security services can cryptography provide?

A

Confidentiality:
Makes data unreadable to entities who do not have the
appropriate cryptographic keys, even if they have the data.

Data Integrity:
Entities with the appropriate cryptographic keys can verify that
data is correct and has not been altered, either deliberately or
accidentally.

Authentication:
Entities who communicate can be assured that the other
user/entity or the sender of a message is what it claims to be.

Digital Signature and PKI (Public-Key Infrastructure):
Strong proof of data origin which can be verified by 3rd parties.
Scalable (to the whole Internet) distribution of cryptographic keys.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Key Management

A

The strength of cryptographic security depends on:

  1. The size of the keys
  2. The robustness of cryptographic algorithms/protocols
  3. The protection and management afforded to the keys

Key management provides the foundation for the secure generation, storage, distribution, and destruction of keys. Key management is essential for cryptographic security. Poor key management may easily lead to compromise of systems where the security is based on cryptography.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Key Usage

A

A single key should be used for only one purpose e.g., encryption, authentication, key wrapping, random number generation, or digital signature generation. Using the same key for two different purposes may weaken the security of one or both purposes. Limiting the use of a key limits the damage that could be done if the key is compromised. Some uses of keys interfere with each other, e.g. an asymmetric key pair should only be used for either encryption or digital signatures, not both.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

AES

A

Advanced Encryption Standard.
Symmetric- key block cipher algorithm.

Has three fixed 128 bit block ciphers with cryptographic key sizes of 128, 192, 256.

unlimited key size,
Blocksize maximum is 256 bits.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

El Gamal

A

El Gamal is a public key algorithm that can be used for digital signatures, encryption and key exchange.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

One-Way Functions

A

A one-way function is a mathematical function that is easier to compute in one direction, than in the opposite direction.

Analogy; drop a glass to the floor. The dropping is easy, putting it back together is more difficult. (CISSP, s.390)
This concept is similar to how one-way functions are used in cryptography.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

RSA

A

The most popular public key algorithm, when it comes to asymmetric algorithms. RSA is a world wide de-facto, and can be used for digital signatures, key exchange, and encryption.
It provides authentication as well as key encryption.

It was developed in 1978 at MIT, by Ron Rivest, Adi Shamir, Leonard Adleman.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

IDEA

A

International Data Encryption Algorithm (IDEA) is a block cipher and operates on 64-bit blocks of data.

The 64-bit data block is divided into 16 smaller blocks, and each has eight rounds of mathematical functions performed on it.

The key 128 bits long. (CISSP, s.384)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Blowfish

A

Blowfish is block cipher that works on 64-bit blocks of data. The key length can be anywhere from 32 bits up to 448 bits, and the data blocks go through 16 rounds of cryptographic functions.(CISSP, s.384)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

RC4

A

RC4 is one of the most commonly implemented stream ciphers. It has variable key size, and is implemented in the Secure Sockets Layers (SSL) protocol.

It is simple, fast and efficient, but vulnerable to modification attacks. Was leaked online and the stolen algorithm is sometimes implemented and referred to as ArcFour(ARC4) because of trademarking. (CISSP, s.384)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

SSH

A

Secure Shell (SSH) is a cryptographic protocol and interface for executing network services. It uses the algorithms; AES, IDEA & Blowfish for encryption.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

PKI

A
Public Key Infrastructure (PKI)
A framework for key distribution in open networks.
...
...
...
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

ECB

A

Electronic Code Book (ECB) Mode
Operates like a code book, and it is the easiest and fastest mode to use. The code book provides the recipe of substitutions and permutations that will be performed on the block of plaintext.

A 64-bit data block is entered into the algorithm with a key, and a block of ciphertext is produced. For a given block of plaintext and a given key, the same ciphertext is produced. There is not enough randomness to the process of encryption, so with larger amounts of data it can be cracked more easily.

Often used to encrypt small amounts of data, such as PINs, challenge-response values in authentication processes and encrypting keys.
(CISSP, s.377)

18
Q

IV = Initialization vector

A

Should change regularly… because of statistical randomization.

19
Q

Stream cipher (symmetric key)

A

Processed 1 bit at a time?
+ High speed
+ Low hardware complexity required

20
Q

Block cipher (symmetric key)

A

Processed in blocks ?

+ Confusion ?
+ Diffusion ?

21
Q

Message Authentication Codes (MAC)

A

??

22
Q

SHA1, SHA2, SHA3

A

Arms race.
SHA1 is deprecated
SHA2 is still in use

23
Q

Algorithm strength

A

Length + ?
Characters in ciphertext should have uniform distribution to avoid exploitation of statistical regularities.

(Shannons Sp network alg?)

24
Q

Hybrid crypto systems

A

Combinations?

25
Q

Diffie Hellman key exchange

A

Combination of private and public variables to create a shared key.