Cryptography 9 Flashcards

1
Q

different encryption keys generate the same ciphertext from the same plaintext message

A

Key Clustering

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Synchronous: encryption or decryption request is performed immediately

Asynchronous: Encrypt/Decrypt requests are processed in queues

A

info …

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Root CA – only issues certificates to Subordinate CA’s

Subordinate CA – issues certificates to users + computers on behalf of the Root CA

Registration authority (RA): responsible for the accuracy of the information contained in a certificate request. The RA is also expected to perform user validation before issuing a certificate request.

A

CA’s

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

??? provided by mixing (changing) the key values used during the repeated rounds of encryption.

??? provided by mixing up the location of the plaintext throughout the ciphertext.

A

Confusion / Diffusion

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

??? allows encryption of partial blocks rather than requiring full blocks for encryption. This eliminates the need to pad a block like in CBC.

??? mode makes a block cipher into a synchronous stream cipher. It generates keystream blocks, which are then XORed with the plaintext blocks to get the ciphertext.

A

CFB / OFB

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Fibonacci Numbers: Sequence of numbers derived by adding the last number in the sequence to the previous one to create the next.

Pseudo-random number generators (PRNGs) are algorithms that can create long runs of numbers with good random properties, but eventually the sequence repeats.

A

info #2 …

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

RSA : Based on the practical difficulty of factoring the product of two large prime numbers. Key sizes are typically from 1,024 - 4,096 bits.

Menezes-Qu-Vanstone (MQV): A protocol used for key agreement that is based on Diffie-Hellman.

A

RSA Etc …

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

EIGamal = based on DH, The algorithm consists of three parts: the key generator, the encryption algorithm, and the decryption algorithm.

Registration Authority (RA): acts as a proxy between the user and the CA. The RA receives a certificate request, authenticates it, and forwards it to the CA.

A

info #3 …

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

RFC 5055. An Internet protocol for determining the path between a X.509 digital certificate and a trusted root (Delegated Path Discovery) and the validation of that path (Delegated Path Validation) according to a particular validation policy.

A

Server-based Certificate Validation Protocol (SCVP)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Cryptanalysis is the art or process of deciphering coded messages without being told the key.

Frequency Analysis: examining ciphertext looking for patterns that can be examined against the frequency rate of letter usage by language.

Kasiski test: A variation on frequency analysis that is used to attack polyalphabetic substitution ciphers.

A

info #4 …

How well did you know this?
1
Not at all
2
3
4
5
Perfectly