Domain 5: Cryptography Flashcards
IDEA Algorithm
120 Bit Key. 64 Bit Block. 8 Rounds
CAST-256
128 Bit Block. 128, 192, 160, 224, 256 Bit Keys
Message Authentication Code (MAC)
Message Auth and Integrity similar to hash.
MAC vs HMAC
MAC: Sender encrypts small block of data with shared secret key. HMAC: Secret key is appended to original message.
Key Space
Number of keys that can be created based on the key length in bits
Two Way Algorithm
Math function that may both encrypt and decrypt a message
Work factor
Time and effor that it takes to break a specific encrypted text
Initialization vector
Unencrypted random number that is used to create complexity during the encryption process. Enhances the effect of the key.
Key clustering
When two different crypto keys create the same ciphertext from same plain text. Indicates flaw
Transposition
Method of placing plaintext horizontally into a grid and reading grid virtually.
Confusion
Increases complexity of encrypted message by modifying they key during the encryption process. Increases work factor.
Diffusion
Increases complexity of encrypted message.
Block Cipher Modes
ECB, CBC CFB, OFB
ECB
Electronic Code Book. Most basic. Blocks of 64 bits are input into an algorithm.
CBC
Cipher Block Chaining. Plaintext is combined or XOR’d ith IV block by block. Then each block is encypted into the next block.