Cryptography (CRY) Flashcards
Algorithm
mathematical function that determines the cryptographic operations
Asymmetric
encryption system using a pair of mathematically related unequal keys
Asymmetric Cryptography
Sender and receiver have public and private keys.
Public to encrypt a message, private to decrypt
Slower than symmetric, secret key (100 to 1000)
Asynchronous
encrypt/decrypt request are processed in queues.
Birthday attack
statistical probabilities of a collision are more likely than one thinks
Black Boxing
manipulates toll-free line voltage to phone for free
Block Cipher
Segregating plaintext into blocks and applying identical encryption algorithm and key
Blowfish
By Bruce Schneider key lengths 32 to 448 bits, used on Linux systems that use bcrypt (DES alternative)
Confidentiality Symmetric, Algorithm
Blue Boxing
tone simulation that mimics telephone co. system and allows long distance call authorization
Brute Force
with enough computing power trying all possible combinations
Caesar cipher
mono-alphabetic substitution cipher
CBC Cipher Block Chaining
blocks of 64 bits with 64bits initialization vector. Errors will propagate
Certificate Authority
PKI, entity trusted by one or more users as an authority in a network that issues, revokes, and manages digital certificates.
Certificate revocation list (CRL)
a temporary public file to inform others of a compromised digital certificate
Certification authority
a trusted issuer of digital certificates
CFB
Cipher Feedback: stream cipher where the cipher text is used as feedback into key generation. errors will propagate
Checksum
a mathematical tool for verifying no unintentional changes have been made
Cipher
cryptographically transformation that operates on characters or bits. DES, word scramble, shift letters
Cipher text
scrambled form of the message or data
Clustering
situation wherein plain text messages generates identical cipher text messages using the same algorithm but with different crypto-variables or keys
Code
substitution at the word or phrase level
Codes
cryptographic transformation that operates at the level of words or phrases. Example: “wedding” means “attack”
Collisions
outputs within a given function are the same result
Concatenation
joining two pieces of text -
Confidentiality Asymmetric Algorithms
RSA (Rivest, Shamir, Adelman) - Factoring large primes
Elliptic Curve Cryptosystem - Logs, discrete logs
Diffie-Hellman for key exchange
El Gamal
Confidentiality Asymmetric Strengths
Confidentiality
Authentication
Non-repudiation
Key management easier
Access control
Integrity
Confidentiality Asymmetric Weaknesses
More processor-intensive than symmetric encryption
Still need to protect private key
Confidentiality Symmetric Algorithms
AES (Extended AES, Rijndael)
RC4
DES - Brute force can break it, but not flawed. Types Lucifer, Feistle Cipher, Triple DES.
Confidentiality Symmetric Strengths
Confidentiality protection
Speed
Bulk encryption - large files efficiency
Availability of free algorithms
Confidentiality Symmetric Weaknesses
Key management
Scalability issues
Shared keys - No authentication or non-repudiation, Forgery by receiver is possible
Confusion
mixing the key values during repeated rounds of encryption, make the relationship between ciphertext and key as complex as possible
relationship between the plaintext and the key is so complicated that an attacker can’t merely continue altering the plaintext and analyzing the resulting ciphertext to determine the key
Cross certification
two certificate authorities that trust each other
Cryptanalysis
code breaking, practice of defeating the protective properties of cryptography.
Cryptographic Algorithm
Step by step procedure to encipher plaintext and decipher cipher text
Cryptography
code making
Cryptography Goals
Confidentiality
Integrity
Proof of origin
Non-repudiation
Protect data at rest
Protect data in transit
Cryptology
The study of cryptography and cryptanalysis
We think about Confidentiality, Integrity, and key exchange
Cryptology - CRY
cryptography + cryptanalysis
Cryptology implementation
IPSec
TLS
Cryptosystem
set of transformations from a message space to cipher space
Cryptovariable
key
CTR
Counter: secure long messages
Decipher
descrambling the encrypted message with the corresponding key
Dictionary attack
try a list of words in passwords or encryption keys
Diffie Hellman Key exchange
switching secret keys over an insecure medium without exposing the keys
Not encryption
Technically - Large prime generation, Groups
Diffusion
mix location of plaintext throughout ciphertext, change of a single bit should drastically change hash, dissipate pattern
a change in the plaintext results in multiple changes spread throughout the ciphertext
Digital certificate
a electronic attestation of identity by a certificate authority
Digital Signature
Asymmetric encryption of a hash of message