Cryptography Extra 6 Flashcards
is used to take the burden off of a CA by handling verification prior to certificates being issued. An RA acts as a proxy between the user and the CA. The RA receives request, authenticates it, and forwards it to the CA.
Registration Authority (RA)
this is a network of trusted certificate authority servers, and is the infrastructure for distributing digital certificates that contain public keys. A PKI is an arrangement that binds public keys with respective user identities by means of a CA.
*** PGP can be used to create certificates and can contain multiple sign.’s.
PKI Etc …
JUNIPER, MAYFLY, FASTHASH, WALBURN, PEGASUS
Type 1 Algorithms
Skipjack, KEA
Type 2 Algorithms
DES, 3DES, SHA, AES
Type 3 Algorithms
the attacker obtains the ciphertexts corresponding to a set of plaintexts of his own choosing. This can allow the attacker to attempt to derive the key used and thus decrypt other messages encrypted with that key.
*** Ciphertext-only : attacker only has access to a collection of cipher texts.
Chosen Plaintext Attack Etc …
attacker can obtain ciphertexts encrypted under 2 different ways where subsequent keys can be derived from previous keys.
Related-Key Attack
finding affine approximations to the action of a cipher used commonly on block ciphers, given enough pairs of plaintext and corresponding ciphertext bits of info about key can be obtained.
Linear Cryptanalysis
for symmetric key, examining of differences in input and how that affects the result difference in the output.
Differential Cryptanalysis