Domain 5 - Cryptography Flashcards
What is the most obvious use for Cryptography?
Confidenitaly
Hashes and Cryptographic Hashes provide what?
Integrity
Why isn’t everything encrypted at all times?
Availability.
Availability is adversely impacted by cryptography through the introduction of extra risk from loss, distribution, or mismanagement of cryptographic keys.
Key Distribution Definition
Method of getting a key from where it was generated to where it needs to be used.
Key Clustering
When different encryption keys generate the same ciphertext from the same plaintext message.
Synchoronous
Refers to when each encryption or decryption request is performed immediately.
Asynchoronous
When ENC/DEC requests are processed in a queues.
Key benefit of asynchronous cryptography
Utilization of hardware devices and multiprocessor systems for cryptographic acceleration.
Hash Function
One-way mathematical operation that reduces a message or data file into smaller fixed length output, or hash value.
Digital Signatures
Provide authentication of a sender, and integrity of a sender’s message.
How do Digital Signatures work?
Sender
- > Message goes into Hash Function
- > Hash Value is encrypted using Sender’s Private Key
Receiver
- > Verifies the digital signature by decryption the hash value using the sender’s public key.
- > Performs same Hash Function
Compares the Hash Functions
Asymmetric
Term used in cryptography in which two different but mathematically related keys are used where one key is used to encrypt and another is used to decrypt.
Term is used in reference to PKI
Digital Certificate
Electronic Document that contains the name of an organization or individual, the business address, the digital signature of the CA issuing the certificate, the Certificate’s holder Public Key, a serial number, and an expiration date.
Used to ID the certificate holder when conducting electronic transactions.
CA
Certificate Authority
Entity trusted by one or more users as an authority in a network that issues, revokes, and manages digital certificates.
RA
Registration Authority
Performs certificate registration services on behalf of a CA.
The RA, a single-purpose server, is responsible for the accuracy of the information contained in a certificate request.
RA is also expected to perform user validation before issuing a CR.
Plaintext/Cleartext
Message in its natural format.
Ciphertext/Cryptogram
Altered form of a plaintext message, so that it’s unreadable for anyone except the intended recipients.
Cryptosystem
Entire Cryptographic Operation.
Includes: algorithm, key, and key management functions
Encryption
aka enciphering
Process of converting the message from its plaintext to ciphertext.
Decryption
Reverse of encryption. Convert ciphertext to plaintext.
Cryptovariable
AKA Key
Input that controls the operation of the cryptographic algorithm.
Determines the behavior of the algorithm and permits the reliable encryption and decryption of the message.
Both Secret and Public Keys
Nonrepudiation
Security service by which evidence is maintained so that the sender and the recipient of data cannot deny having participated in the communication.
Algorithm
Mathematical function that is used in the encryption and decryption process.
Cryptanalysis
Study of techniques for attempting to defeat cryptographic techniques and, more generally, IS Services