Cryptology Flashcards

1
Q

2 Different protocols for IPSec

A
  1. Authentication Header(AH) ? provides authentication

2. Encapsulating Security Payload(ESP) ? whole suite of security

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Advanced Encrption Standard (AES)

A

Uses Rijndael Block Cipher. Incorporates variable block cipher and key lengths. Uses a key size of 128.192, or 256. Approved by government

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Asymmetric key algorithms

A
  1. Diffie?Helman ? requires key agreement
  2. El Gamal ? Functions on the encryption and digital signature. Often operates slowly.
  3. Elliptic Curve Cryptosystem(ECC) ? Often difficult to implement but capable to functioning with limited resources such as power and bandwidth.
  4. Merkle?Hellman Knapsack ? Applying weights to each set of items where the total defines the items in the knapsack. Used w/ trapdoors to one?way functions.
  5. RSA ? Functions on the encryption, digital signature, and key exchange.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Asymmetric Key Cryptography

A

A method of encoding information that uses 2 keys and a one?way function. Public key encrypts, private key decrypts. can perform authenticatoin and non?repudiation. a/k/a public key cryptography

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Block Cipher

A

An encryption method that breaks the message into blocks of data bits. Each block is encoded.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Blowfish

A

Block cipher with block lengths, encrypted thru 16 X of 64 bits and key lengths up to 448 bits.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Ceaser Cipher

A

Common form of substitution. Moves each letter 3 places forward in relation to its number.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Characteristics of a message hash

A
  1. Set length signature is created from variable length input.
  2. Slight change in orginal creates great difference in result signatures.
  3. Chances of 2 differing input values produce the same output signatures are low.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Clipper Chip

A

An encryption chip for digital voice communications that automatically encrypts and decrpyts.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Concealment Cipher

A

A predetermined key or groups of words used to decode a message, such as reading only every fourth word.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Cryptanalysis

A

Breaking or cracking the code and deciphering the data without authorization

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Cryptosystem

A

A system for encoding and deciphering data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Data Encryption Standard (DES)

A

56 bit cipher key for symmetric key encryption. Remaining 8 bits are used for parity, performed through 16 rounds. Susceptible to brute force attacks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Decipher

A

To decode the data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Differential Cryptanalysis

A

Compares two plain text data sets suring encryption to determine probably keys. Often used against block ciphers.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Digital Signature

A

Validates identity of sender. approved by NIST via SHS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Encipher

A

To code the data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Factoring

A

Attempting to determine the prime factors of the keys.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

International Data Encryption Algorithm (IDEA)

A

Block cipher with block lengths of 64 bits divided into 16 bit units and encrypted 8 X. key lengths of 128 bits

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Key Escrow

A

Form of symmetric key cryptography used by law enforcement. Third party agency maintains the key.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Keyspace

A

The group of numbers used to create a key.

22
Q

Linear Cryptanalysis

A

Compares known plain text and ciphertext to determine probably keys

23
Q

Man?in?the?middle

A

Intercepting messages between the sender and receiver

24
Q

Meet?in?the?middle

A

Compares known plaintext and keys to intercepted encrypted text.

25
Q

Message Digest(Message Hash)

A

Cryptographic data that verifies the contents of a message that has not been altered.

26
Q

Name 4 Email Security Methods

A
  1. Pretty Good Privacy(PGP) ? uses PGP keys only
  2. Privacy Enhanced Mail(PEM) ? can use various keys
  3. Multipurpose Internet Mail Extension(MIME) ? good choice for internal and standalone. No inherent security measures
  4. Secure/MIME(SMIME)
27
Q

Name 5 Internet Security Methods

A
  1. Internet Security Protocol(IPSec) ? server to server, remote access, network protection.
  2. Secure Electronic Transaction(SET) ? transmitting credit card data
  3. Secure Hypertext Transport Protocol(SHTTP) ? Protects single pages
  4. Secure Shell(SSH?2) ? remote access over the network.
  5. Secure Socket Layer(SSL) ? client to server authentication (HTTPS)
28
Q

Name some Message Digest Formats

A

Message Digest 5 (MD5)
Secure Hash Algorithm(SHA)
Hashed Message Authentication Code (HMAC)

29
Q

Name the 3 modes of 3DES

A
  1. DES?EDE2 ? Encrypt with one key, decrypts with another, encrypts with the first key again.
  2. DES?EEE2 ? Encrypts with one key, encrypts with a 2nd key, encrypts with the first key
  3. DES?EEE3 ? Encrypts with one key, encrypts with a 2nd key, encrypts with a 3rd key.
30
Q

Name the 4 modes of DES

A
  1. Cipher Block Chaining(CBC) ? Most common. XORs an initialization block.
  2. Cipher feedback(CF) ? uses stream cipher
  3. Electronic Code Book(ECB) ? Uses Block ciphering
  4. Output Feedback(OF) ? Easy to break, XORs plain text
31
Q

Non?repudiation

A

Ensuring that the message sender is tracked and stored as having sent the message.

32
Q

Open Message

A

Encrypts message with private key, provides authentication only.

33
Q

Polyalphabetic Cipher

A

Uses multiple alphabets to encode data. (i.e. vigenere cipher)

34
Q

Public Key Infrastructure(PKI)

A

Keys are created on the PC. Designed to address remote users and their data transmissions. common for e?commerce.

35
Q

RC5

A

Block cipher with variable block and key lengths and as well as encryption iterations

36
Q

RC6

A

Block cipher based on RC5. Uses a min. 128 block size and 2 working registers to comply with AES

37
Q

Rijndael Block Ciper

A

Uses both variable block and key lengths determined by the implementation. The lengths can be either 128,192, or 256.

38
Q

Running Key Cipher

A

Using some predetermined set of actions taken to decode a message.

39
Q

Secure Message

A

Encrypts the message with public key, provides confidentiality only.

40
Q

Signed and Secure Message

A

Encrypts the message with private key and then with public key, provides authentication and confidentiality

41
Q

Steganography

A

Photographs or other digitial media used to hide messages.

42
Q

Stream Cipher

A

An ecryption method that breaks the message into a stream of single bits. Each bit is encoded. Slow method

43
Q

Substitution

A

A method of encoding data that uses the alphabet and each letter’s associated numbers. Predetermined pattern.

44
Q

Symmetric Key Cryptography

A

A method of encoding data that uses a single key. Used by both sender and receiver. Good to use with large amounts of data and is faster than Asymmetric

45
Q

Transposition

A

A method of encoding data that scrambles the letters of the message. a/k/a ? Permutation

46
Q

Triple DES (3DES)

A

Uses 112 bit cipher key for symmetric key encryption. Encrypts message 3 times.

47
Q

Twofish

A

Block cipher with 128 bit block lengths, encrypted 16 X and key lengths up to 256 bits.

48
Q

What are the 4 primary goals of cryptography?

A

Confidentiality, Integrity, Authentication, and non?repudiation.

49
Q

What is the difference between keyed and non?keyed message digests?

A

Keyed ? original message combined with a secret key. (MACs)

Non?Keyed ? original message hashed without any other mechanisms(MICs and MDCs)

50
Q

Work Factor

A

Estimated amount of work it would take to break the code.