Cryptography Flashcards
Making something less visible or obvious
ex:making a picture blurry
Diffusion
CRL
Certification Revocation List
-Being replaced by OCSP because of speed
DES - first type of block encryption
Data Encryption Standard
Taking one value and changing it for another
ex:making all A’s into C’s
Subsitution
Data at rest
Something stored and not being used - something sitting on a hard drive or flash drive
Cryptanalysis
Breaking encrypted codes
Type of key that can only encrypt
Public Key
Unlike block ciphers, this one works by encrypting one bit at a time as it passes through
Streaming Ciphers
Cipher that works like a decoder ring
Ceaser Cipher
Which is older?
MD5 or SHA-1
MD5
Shared key for a set of data
Session Key
Type of key that can decrpt
Private Key
Ripemd
Bit #
Not very common Hash
128, 160, 256, 320 bit hash
HMAC
Hash-based message authentication code
- requires each side of the conversation to have the same key
- provides message integrity
- based on standard hashes
ECB
Electronic Code Book
GCM
- block encryption with authentication
- commonly used in packetized data
Galois Counter Mode
Encryption/Decryption
Hiding data and then bringing it back
AES
Advanced Encryption System
EDH or DHE
Ephemeral Diffie Hellman
Type of encryption used for WPA2
AES
In-band
Key is sent with encrypted data
Mixing something up
ex:moving pixels around in a picture
Confusion
PKCS-7
Is a way to store certificates as individual files
Key Stretching
Stretches out the password/hash
ex: bcrypt
Digital Signature
Just a hash of whatever data you’re looking at
Attack using a pre-generated index hash table for harder passwords/hashes than brute force can handle
Rainbow Table Attack
What are the 4 types of Symmetric Block Modes
Cipher Block Chaining (CBC)
Cipher Feedback (CFB)
Output Feedback (OFB)
Counter (CTR)
Type of Streaming Cipher
RC4
MD5
Bit #
Message Digest 5
128 bit
RSA Cryptosystems
Asymmetric Algorithm
TLS
-provides transport encryption
Transport Layer Security
Temporary key so it can’t be used in future sessions
-provides “perfect forward secrecy”
Ephemeral Key
PGP
Pretty Good Privacy
Asymmetric encryption originally used for email
Cipher that uses a grid setup like a ceaser cipher but uses a key that’s applied instead of ROT telling you how far to turn
Vigenere Cipher
ECDHE
Elliptic Curve Diffie Hellman Ephermeral
Encrypts data in small chucks until finished
Block Encryption
Block cipher
64-bit block size
16 rounds
Key size: 32-448 bits
Blowfish
Data in transit
Data that is being transferred like over the internet
Streaming cipher
1 bit at a time
1 rounds
Key size: 40 - 2048 bit
RC4
What is Cain and Abel
A password/hash cracking program
Salt
Adding characters to a password before hashing to make password very hard to crack
- Block modes will always generate same results with same input
- Can generate patterns that give away data
- No one uses this anymore
ECB - Electronic Code Book
Symmetric Block Mode
-Uses Initialization Vector to XOR to encrypt
CBC - Cipher Block Chaining
Symmetric Block Modes use this to ensure the output block is uniquely different?
IV - Initialization Vectors
Encryption style that uses the same key to encrypt and decrypt
Symmetric encryption
Out-of-band
Delivering the key separately from data
SHA 1 and 2
Bit #
Secure Hash Algorithm SHA-1 160 bit SHA-2 256bit and 512bit
Block cipher
64-bit block size
16 rounds
Key size: 56 bit
DES - Data Encryption Standard
PKI
Public Key Infrastructure Is a hierarchy Certificate Authorities at top Intermediate Authorities Then Users at the bottom
What kind of encryption do computers use?
Binary Encryption
IPsec
Internet Protocol Security
Digital Certificate
Includes public key/digital signature/3rd party digital signature
This is what a website will send you so you know they are legit
Type of encryption used for WPA
RC4
Block cipher
128-bit block size
10, 12, or 14 rounds
Key size: 128, 192, or 256 bit
AES - Advanced Encryption System
Data in process
Data that is being used and is on memory(ram) or the CPU
Diffie-Hellman
Asymmetric algorithm
Key exchange protocol
Symmetric Block Mode
-Uses Initialization Vector to encrypt to XOR to replace IV with output
CFB - Cipher Feedback
Symmetric block encryption
Still used by Gov’t
AES - Advanced Encryption System
PFS
-all browsers now-a-days have to support this
Perfect Forward Secrecy
OCSP
Online Certificate Status Protocol
-Is a more modern version of Certification Revocation List (CRL)
Steganography
- Hides data within data
- Commonly used with graphic images
- Hidden data may or may not be encrypted
Types of Hashes
MD5
SHA
SHA-2 (Most common)
Ripemd (not very common)
Hashes
- Create a small value from any amount of data
- Will produce the same results each time the source is hashed
Block cipher
64-bit block size
16 rounds
Key size: 56 bit x3
3DES
Triple DES
Practice of disguising information in a way that looks random
Cryptography
Symmetric Block Mode
-Uses Initialization Vector to encrypt to XOR
OFB - Output Feedback
PKCS-12
Stores certificates and private keys as a package
Uses a key pair - public and private key
-public key is only used to encrypt
-private key is only used to decrypt
Used mostly to change a session key securely
Asymmetric Encryption
Unsigned Certificate
Can be made easily - they just don’t have the 3rd party vouching for them
Principle that states as long as you don’t know what the key is, you can understand the algorithm completely and still not be able to crack it
Kerckhoffs’s Principle
ECC
Creates a smaller key than RSA with the same security
Elliptic Curve Cryptography
Taking something that looks like it makes sense and to hide it so it doesn’t make sense to the outside observer
Obfuscation
Example of ROT2
Turning a decoder ring twice
Web of Trust
Uses a web of mutually trusting peers and requires a lot of maintenance
Symmetric Block Mode
- Uses NONCE to Counter Value to Encrypt first block to XOR
- Counter then gets incremented each round
CTR - Counter
Defined piece of cryptography process that programmers can use to get stuff done - defines key properties, communication requirements for the key exchange and the actions taken through encryption and decryption process
Cryptosystem
Primary way we encrypt data
Symmetric Encryption