Cryptography Extra 6 Flashcards

1
Q

is used to take the burden off of a CA by handling verification prior to certificates being issued. An RA acts as a proxy between the user and the CA. The RA receives request, authenticates it, and forwards it to the CA.

A

Registration Authority (RA)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

this is a network of trusted certificate authority servers, and is the infrastructure for distributing digital certificates that contain public keys. A PKI is an arrangement that binds public keys with respective user identities by means of a CA.

*** PGP can be used to create certificates and can contain multiple sign.’s.

A

PKI Etc …

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

JUNIPER, MAYFLY, FASTHASH, WALBURN, PEGASUS

A

Type 1 Algorithms

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Skipjack, KEA

A

Type 2 Algorithms

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

DES, 3DES, SHA, AES

A

Type 3 Algorithms

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

the attacker obtains the ciphertexts corresponding to a set of plaintexts of his own choosing. This can allow the attacker to attempt to derive the key used and thus decrypt other messages encrypted with that key.

*** Ciphertext-only : attacker only has access to a collection of cipher texts.

A

Chosen Plaintext Attack Etc …

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

attacker can obtain ciphertexts encrypted under 2 different ways where subsequent keys can be derived from previous keys.

A

Related-Key Attack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

finding affine approximations to the action of a cipher used commonly on block ciphers, given enough pairs of plaintext and corresponding ciphertext bits of info about key can be obtained.

A

Linear Cryptanalysis

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

for symmetric key, examining of differences in input and how that affects the result difference in the output.

A

Differential Cryptanalysis

How well did you know this?
1
Not at all
2
3
4
5
Perfectly