Domain 3 - Security Architecture and Engineering Flashcards
Caesar Cipher
Simple substitution cipher – Moved character 3 spaces
Subject to package analysis
Symmetric Vs Asymmetric
Symmetric - same key to encrypt and decrypt
Asymmetric - different keys to encrypt and decrypt
Vignere cipher
First polyalphabetic cipher
Enigma machine
used by Japan during WWII
PAIN of cryptography
PAIN Privacy Authenticity Integrity Non-repudiation
Initialization vector
Random bit string added that is the same length as the block size. XOR
Name a stream cipher
RC4
Symmetric
Relies on the use of a shared secret key
Pros -Fast -Good strong privacy Cons -out of band key distribution -doesn't scale well -does not provide non-repudiation
Symmetric cipher types
Stream
Block
Asymmetric cryptography
Every user has a key pair - private and public key
Asymmetric Algorithms
SA’s
E’s
DH
Asymmetric Algorithms
SA's RSA & DSA ECC & El Gamal DH (Dougie Houseer has a backpack) Diffie Hellman & Knapsack
Standard for digital signatures
RSA
What algorithm uses factorization
RSA
First asymmetric algorithm
Diffie Hellman
ECC
Elliptical Curve Cryptography
Based on points on a curve
Very efficient but only for key agreement (digital signatures)
Used on handheld devices
Usually the standard and answer for any Symmetric questions….
AES
Unless PGP then its IDEA
What keys are mathematically related
Asymmetric