Domain 3 set 6 Flashcards
A standard proposed by credit card issuers but never became widely adopted.
Secure electronic transaction (SET)
Ciphers that use multiple alphabets on a rotating basis.
Polyalphabetic substitution
Chosen Plaintext Attack
The attacker can create an encrypted message of his choice, to figure out the key.
AES key lengths.
128, 192, 256
Cryptography
The science of protecting data so that it may be stored and transmitted between parties while preserving confidentiality and/or integrity.
Twofish key length.
256 bits
DES modes that allow errors to propagate.
CBC, CFB
Frequency Analysis?
Used to detect patterns in ciphertext.
Digital signatures use what type of algorithm?
Asymmetric
NAND (not AND)
Logical function that is true only when one or both elements are false.
AND
Logical function that is true only when both arguments are true.
3 main product evaluation models?
- TCSEC Orange book
- ITSEC
- Common Criteria
What is it called when you fill a known gap in physical security?
Compensating Control ( placing a guard at the gate entry)
NOT
Logical function that is true only when a single argument is false.
RC5 key length.
up to 2048 bits
Cryptology
The science that involves the use of codes and cyphers to obscure the meaning of a message.
Cryptanalysis
The science of breaking cryptographic algorithms to obtain the secret message without authorization.
Hash that produces a 160 bit digest.
SHA-1
AES?
Types of algorithm
block or stream
Symmetric
128 bit Blocks
AES block length.
128 bits
NOR (not OR)
Logical function that is true only when both elements are false.
Rijndael is what encryption?
AES
Blowfish key length.
32 to 448 bits
Four modes of DES encryption.
ECB, CBC, CFB, OFB
how 3DES modes modes?
3
Statistical
Uses a mathematical analysis of a message to break the cryptosystem.
Mail encryption that uses 3DES, RSA, MD5, and X.509.
Privacy enhanced mail (PEM)
Four modes of 3DES.
DES-EEE3, DES-EDE3, DES-EEE2, DES-EDE2
AES key size and rounds?
128 bit - 10 rounds
192 bit - 12 rounds
256 bit - 14 rounds
Cryptosystems
Sets of techniques that implement cryptography.
What is the differant in a Code then a cipher?
A Code is a system the substitutes one word or phrase for another for secrecy or efficiency. Example the 10 code used by police (10-20).
Hash that produces a 256 bit digest.
SHA-256
XOR (exclusive OR)
Logical function that is true only when one of the elements is true and the other is false.
Known plaintext attack
the attacker has access to the unencrypted message
3DES?
Types of algorithm
rounds
key length
Symmetric
64- bit Blocks
48 rounds
key length 112 bits