Domain 3 - Cryptographic concepts | Crypto Attacks | PKI Infrastructure Flashcards
Symmetric Encryption - Strengths
Speed, and strength per bit of key
Symmetric Encryption - Weakness
Key must be shared securely
Symmetric Encryption - Stream Cipher
Each bit is independently encrypted
Symmetric Encryption - Block cipher
Blocks of data are encrypted
Initialization Vector
Symmetric EncryptionEncryption step. Used on Symmetric ciphers to ensure that the first block of data is random
DES Encryption type
Symmetric
DES
Data Encryption Standard
DES Encryption dates
1976 US Fed standard
DES Encryption, who designed
IBM, based on older lucifer symmetric cipher
DES Encryption, block size
64 bit
DES Encryption, key size
56 bit
DES Modes
5 modes
Double DES
The DES encryption algorithm with two rounds, with two keys. Rendered unusable due to being susceptible to meet in the middle attacks.
Triple DES
Expands the size of the key by running the algorithm in succession with three different keys. It makes 48 passes through the algorithm, and the resulting key is 168 bits.
IDEA Encryption/Cipher Type
International Data Encryption Algorithm.Symmetric Block Cipher
IDEA - good or bad?
Held up to cryptanalysis
IDEA - drawback
Patent encumbrance (no longer an issue, not sure if tested as an issue or not) and slow speed
AES Acroynym and encryption type
Advanced Encryption Standard - Symmetric
AES Block and Key Size
128 bit block
Key - 128 bit to 256 bit.
128 with 10 rounds of encryption192 bit with 12 rounds of encryption 256 bit with 14 rounds of encryption
Blowfish cipher type
symmetric
RC5 and RC6 designed by
RSA Labs
Asymmetric Encryption Pros
Solves issues around preshared keys
Asymmetric key how many
two. Public/private key pair
hashing/one-way functions
easy to compute one way. VERY difficult to reverse
Asymmetric, factoring prime numbers. factorization.
Relies on strength of composite number. Example: 6269 x 7883 = 49418527.To crack, you must factor 49418527 to find which two prime numbers are factors.
Discrete logarithm
Basis of the Diffie-hellman and El Gamal asymmetric algs
Uses in Asymmetric algorithms. Way to ensure encryption.
More advanced than factorization and considered more secure.
Diffie-Hellman Key agreement protocol, and encryption type.
Asymmetric encryption algorithm.
Allows two parties to securely agree on a symmetric key via a public channel
Type of key exchange that is secure. If an attacker sniffs the whole conversation, they still can’t obtain the key.
Elliptic Curve Cryptography
Type of encryption. Uses discrete logarithms. Asymmetric encryption.
Stronger than factorization based encryption methods. Uses less computational power, and smaller key for equal strength.
Asymmetric and Symmetric tradeoffs
Asymmetric - slower, weaker on equal sized keys. Pro no need for preshared key
Both types are often used together Symmetric - faster, weak due to pre-shared keys.
Hash Functions
Encryption using algorithm, does not have a key. One Way. Impossible to reverse. Variable length plaintext is hashed into a fixed length hash
Collisions
This is what happens if two separate, and non-identical inputs to a hash algorithm result in identical hashes.
MD5 Acronym and type
Message Digest 5, hashing algorithm.
SHA-1 Acronym and type
Secure Hash Algorithm, hash
SHA2-224/SHA3-224SHA2-256/SHA3-256SHA2-384/SHA3-384SHA2-512/SHA3-512 lengths
Length of hash value is in the name.
HAVAL acronym and type
Hash of variable length. Hash
Brute force
attempts every possible valid combination for a key or password.
Known Plaintext
In the known plaintext attack, the attacker has a copy of the encrypted message along with the plaintext message used to generate the ciphertext (the copy).
If I know an input and output. I can potentially guess a key.
Chosen Plaintext and adaptive chosen plaintext
In this attack, the attacker obtains the ciphertexts corresponding to a set of plaintexts of their own choosing. This allows the attacker to attempt to derive the key used and thus decrypt other messages encrypted with that key.
analyst chooses plaintext to be encrypted.Analyst then changes further rounds of encryption based on previous round
Chosen Ciphertext
In a chosen ciphertext attack, the attacker has the ability to decrypt chosen portions of the ciphertext message and use the decrypted portion of the message to discover the key.
meet in the middle attack
Used to attack algorithms that use only two rounds of encryption.
the attacker uses a known plaintext message. They then encrypt using all possible keys, and decrypt using all possible keys. In this way they can find all possible key pairs, AND all possible cipher texts for the plaintext.
Only takes twice as long as breaking a single round of encryption.
Known Key
Analyst knows something about the key, and can use that to reduce efforts used to attack it.
Side Channel Attacks
Use physical data to break cryptosystem. Monitoring CPU cycles or power consumption used while encrypting/decrypting.
Birthday Attack
Create hash collisions and break the key
Key clustering
When two different symmetric keys run on same plaintext and algorithm produce same ciphertext.
Analogous to collisions in hashing, but in relation to symmetric encryption.
Digital signatures
Method of authentication and non-repudiation.
Process:
- Sender hashes their message, and appends hash to email
- Sender then encrypts entire email using their private key.
- Receiver decrypts message using public key (they now know the sender is authentic - only the sender could have encrypted).
- Receiver then hashes the message on their own - if the hash is the same as appended to the email they know that integrity has been preserved.
HMAC Acronym and length
Hash Message Authentication Code - Variable length hash value
Used to implement a partial digitial signature. Combines hashing and symmetric encryption (full digital signature uses asymmetric).
PKI Public Key Infrastructure Process of key exchange.
leverages all three forms of encryption. Symmetric, asymmetric, and hashing.
- Certificate requestor opens an asymmetric channel w/server to verify identity, and to share symmetric key.
- server accept asymmetric channel. Agree on an ephemeral key.
- Server hashes and encrypt the certificate.
- Recipient decrpypts cert, and checks hash for integrity.
- Recipient checks certificate against the CA.