Cryptology Flashcards
2 Different protocols for IPSec
- Authentication Header(AH) ? provides authentication
2. Encapsulating Security Payload(ESP) ? whole suite of security
Advanced Encrption Standard (AES)
Uses Rijndael Block Cipher. Incorporates variable block cipher and key lengths. Uses a key size of 128.192, or 256. Approved by government
Asymmetric key algorithms
- Diffie?Helman ? requires key agreement
- El Gamal ? Functions on the encryption and digital signature. Often operates slowly.
- Elliptic Curve Cryptosystem(ECC) ? Often difficult to implement but capable to functioning with limited resources such as power and bandwidth.
- Merkle?Hellman Knapsack ? Applying weights to each set of items where the total defines the items in the knapsack. Used w/ trapdoors to one?way functions.
- RSA ? Functions on the encryption, digital signature, and key exchange.
Asymmetric Key Cryptography
A method of encoding information that uses 2 keys and a one?way function. Public key encrypts, private key decrypts. can perform authenticatoin and non?repudiation. a/k/a public key cryptography
Block Cipher
An encryption method that breaks the message into blocks of data bits. Each block is encoded.
Blowfish
Block cipher with block lengths, encrypted thru 16 X of 64 bits and key lengths up to 448 bits.
Ceaser Cipher
Common form of substitution. Moves each letter 3 places forward in relation to its number.
Characteristics of a message hash
- Set length signature is created from variable length input.
- Slight change in orginal creates great difference in result signatures.
- Chances of 2 differing input values produce the same output signatures are low.
Clipper Chip
An encryption chip for digital voice communications that automatically encrypts and decrpyts.
Concealment Cipher
A predetermined key or groups of words used to decode a message, such as reading only every fourth word.
Cryptanalysis
Breaking or cracking the code and deciphering the data without authorization
Cryptosystem
A system for encoding and deciphering data.
Data Encryption Standard (DES)
56 bit cipher key for symmetric key encryption. Remaining 8 bits are used for parity, performed through 16 rounds. Susceptible to brute force attacks
Decipher
To decode the data
Differential Cryptanalysis
Compares two plain text data sets suring encryption to determine probably keys. Often used against block ciphers.
Digital Signature
Validates identity of sender. approved by NIST via SHS
Encipher
To code the data
Factoring
Attempting to determine the prime factors of the keys.
International Data Encryption Algorithm (IDEA)
Block cipher with block lengths of 64 bits divided into 16 bit units and encrypted 8 X. key lengths of 128 bits
Key Escrow
Form of symmetric key cryptography used by law enforcement. Third party agency maintains the key.