Domain 3 set 2 Flashcards
IDEA
Used by PGPAn Symmetric Algorithm & Block Algorithm
3DES Algorithm type?Block or stream?# of rounds?
Symmetric Algorithm Block Algorithm48 Rounds
3DES was replaced by?
AES
BlowFish Algorithm type?Block or stream and size?# of rounds?
Symmetric Algorithm Block Algorithm 64-bit block size 48 Rounds public
TwoFish Algorithm type?
Block or stream and size?
key length?
Symmetric Algorithm
128 bit block size
key length 128, 192 or 256 bits
Symmetric Algorithm only gives you what?
Privately
Stream Ciphers use What?
XOR
XOR
if values are:
A like = 0 value
Different = 1 value
Block Crypto have to be what type of Algorithm ?
Symmetric Algorithm
Symmetric Block Algorithms are?
- AES - Standard
- 3DES - More cpu intenced (slower)
- P2P - IDEA used in mail
the slower Algorithm is?
Asymmetric
Other names for Symmetric Algorithm?
- Private Key
- Secret Keys
- Share Keys
- Session Keys
Shared Key Crypto?
Symmetric Algorithm
Kerchoff’s Principle Means?
Keep the Key Secret,
The algorithm is Publicly known.
** Openness **
What is Diffusion in Block cipher ?
Transposition
*** Plain Text is Added with the Cipher text
What is Confusion in Block cipher ?
Relates to Substitution
** Good Strong Math)
Diffusion and Confusion is used in what?
Symmetric Algorithm
Two Primary Attributes To Symmetric Algorithm Block cipher?
Diffusion and Confusion
Another way to say Cipher?
Algorithm
The 5 Desirable qualities of an Algorithm
- Diffusion
- Confusion
- Avalanche = A charter change Cascades through the text
- Permutations = Rounds
- openess = Kerchoff’s Principle
Algorithm rounds are also called ?
Permutations
Sue-do Randam Numbers is also called?
Initialization Vector
Security Services provided by Cryptography?
P = Privacy A= Authenticity I = Integrity N= Non-Repubiation
Authenticity does what?
Verifies the Claimed Identity
The 4 Requirements for Vernam Cipher (one Time Pad)
- The Key must be used only once.
- The Pad Must be at least as long as the Message
- Key Pad is Statistically Unpredictable
- The key Pad must be delivered and stored securely.
The only unbreakable Mathematically cryptography is?
Vernam Cipher (One Time Pad)
The Cipher that the first letter of the key is matched up against the first letter of the message?
Polyalphabetic Cipher (VIGNERE)
First Polyalphabetic Cipher ?
VIGNERE
A cipher that was wrapped rounded a rod?
ScytaleThe size (diameter) of the rod was the secret key
A cipher that are subject to pattern analysis
Substitution Ciphers(Caesar Cipher)
Caesar Cipher was what type of Cipher?
Substitution Ciphershift characters (3) spaces
The Security Model That Protects Integrity?
BIBA Model and Clark-Wilson
The Security Model That enforces well-formed transactions?
Clark-Wilson
Clark-Wilson uses what for Separation of duties?
API’s
RC4
Stream or block
Algorithm ?
stream
Symmetric Algorithm
variable length key
to create RSA keys use use what?
two large prime numbers