Cryptography & PKI Flashcards
Define Cipher Text
Text that has been encrypted for confidentiallity
Define Plain Text
Readable text for human comprehension
Define Symmetric Encryption
Encryption using a shared secret key, typically used for bulk encryption
Define Asymmetric Encrytpion
Encryption using a key pair consisting of a private and a public key
Goals of Cryptology
Confidentiality
Integrity
Authentication
Non-Repudiation
Define a Code
Substitutes one word or phrase for another
Define a Cipher
A mathematical algorithm for encryption
Types of Ciphers
Stream verses Block
Substitution verses Transposition
Define a Stream Cipher
Encrypts a single character at a time
Define a Block Cipher
Encrypts a chunk of text at a time
Define a Substitution Cipher
Encrypts by changing individual characters
Define a Transposition Cipher
Encrypts by scrambling letters
Define XOR
Exclusive Or;
True when only one input of two or more are true
Explain the Confusion Principle
Hide connection between cipher and key, can be used in stream and block ciphers
Explain the Diffusion Principle
Any change in input creates 50% or greater change in output
Explain the Obfuscation Principle
Action taken to make something unclear, unintelligible, or obscure
One-Time Pad Criteria
2 identical pads
Equal length
Single Use
Explain Security through Obscurity
Security reliant upon secrecy,
Generally disparaged
5 Stages of NIST Crypto Lifecycle
Initiation Develop and Acquire Implement and Assess Operate and Maintain Sunset; stop, destroy, or archive
DES Key Facts
Symmetric
64 bit blocks
56 bit key
Insecure
3DES Key Facts
Symmetric 64 bit blocks 168 bit key (112 effective key length) Secure utilizing 3 separate keys Used in IPsec
AES Key Facts
Symmetric 128 bit blocks 128, 192, or 256 bit key Secure Uses Rijndael block Cipher
Blowfish Key Facts
Symmetric
64 bit blocks
32-448 bit key
Secure (at larger key sizes)
Twofish Key Facts
Symmetric
128 bit block
128, 192, or 256 bit key
Secure (more complex and faster then Blowfish)
RC4 Key Facts
Symmetric Stream cipher 40-2048 bit key Not secure/most common Used in WEP and SSL
Cipher Block Modes
ECB
CBC
CR
GCM
Describe ECB Mode
Electronic Codebook;
Utilize same encryption key for each block
Describe CBC Mode
Cipher Block Chaining;
Use previous cipher block as key for subsequent blocks
Describe CR Mode
Counter Mode;
Uses nonce plus a counter for encryption key.
Counter increases for each block
Describe GCM
Galois Counter Mode;
Adds authentication ability to CR
Define Stegonography
Hiding data in large files
RSA Key Facts
Asymmetric
1024-4096 bit key
Digital certificate with key distribution
Secure
Define PGP/GnuPG
Pretty Good Privacy;
Encrypt with random shared key (symmetric)
Encrypt random key with public key (asymmetric)
GnuPG is open source version
Define Perfect Forward Secrecy
Nodes work independent of one another so that no node knows both final source and destination
Key Exchange Methods
Out-of-band
In-Band
Explain the Diffie-Hellman Process
Select common number and share
Choose secret number and compute results
Share results
Use shared results to create shared secret
Define DH Group 1
768 bit group
Insecure
Define DH Group 2
1024 big group
Insecure
Define DH Group 5
1536 bit group
Insecure
Define DH Group 14
2048 bit group
Secure
Define DH Group 20
384 bit elliptic curve
Secure
Define DH Group 21
521 bit elliptic curve
Secure
Define DH Group 24
2048 bit group
256 bit subgroup
Secure