Encryption Flashcards

1
Q

Substitution

A

like shifting and rotating alphabets, can be broken by statistical looking at repeating characters or repeats

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Vernam

A

cipher (one time pad): - key of a random set of non-

repeating characters

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Transposition

A

Permutation is used, meaning that letters are scrambled. The key determines positions that the characters are moved to, for example vertical instead of horizontal

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Null Cipher

A

e.g. steganography

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Key clustering

A

when different encryption keys generate the same ciphertext from the same plaintext message

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Hash Function

A

one-way mathematical operation that reduces a message or data file into a smaller fixed length output

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Registration Authority

A

performs certificate registration services on behalf of a CA. RA verifies user credentials

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Certificate Authority

A

PKI, entity trusted by one or more users as an authority in a network that issues, revokes, and manages digital certificates.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Confusion

A

mixing the key values during repeated rounds of encryption, make the relationship between ciphertext and key as complex as possible

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Diffusion

A

mix location of plaintext throughout ciphertext, change of a single bit should drastically change hash, dissipate pattern

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Block cipher

A

segregating plaintext into blocks and applying identical encryption algorithm and key

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Assymetric

A

Public-private
does not need pre-shared
Nx2 keys.
weaker per bit than symmetric

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Symmetric

A

Shared key

faster, stronger per bit

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

DES

A
Symmetric 
Data Encryption Standard (could be called DEA)
64 bit block Cipher
56 bit key 
16 rounds of encryption
No longer secure
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

3DES

A
Symmetric 
64 bit block Cipher
56 bit key 
16 rounds of encryption
3 rounds of DES
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

IDEA

A
International Data Encryption Standard
Symmetric
128 bit key
64 bit block size
not frequently used as it is patented until 2012
Used by PGP
considered secure
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

AES

A

Advanced Encryption Standard
Rijndael algorithm is used, chosen to replace DES
Symmetric
Open Source and widely used
Secure
128 bit block size (Rijndael is variable)
128 bit key, 192, or 256

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Blowfish

A

Symmetric
No longer secure
64bit blocks, 32 to 448 bit keys

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Twofish

A

Symmetric
Secure
128bit blocks, 128, 192, 256 bit keys

20
Q

RC4

A

Symmetric
no longer secure
Stream Cipher
40 - 2048 bit key length

21
Q

RC5

A
Symmetric
Secure
Block cipher 
32, 64, 128 bit blocks
0 to 2040 bits key length
22
Q

RC6

A

Symmetric
Secure
Block cipher

23
Q

RSA

A
Asymmetric
Secure
uses factorisation of very large prime numbers
1094 - 4096 bit keys
Used to exchange symmetric keys
24
Q

DH

A

Diffie Hellman
Asymmetric
First Public-private key used
Can be used even when there is no PKI or secure means to exchange keys

25
Q

ECC

A
Elliptic Curve Cryptology
Asymmetric
Uses discrete logarithm
Stronger per bit - 256 ECC = 3072 RSA 
patented
26
Q

ElGamal

A

Asymmetric
Uses DH
One issue is that it doubles length of message
Used in PGP

27
Q

DSA

A

Digital Signature Algorithm
Asymmetric
variant of Elgamal

28
Q

Knapsack

A

Asymmetric
- one way encryption
public key used only for encryption and private only for decryption. not suitable for authentication
no longer secure

29
Q

MD5

A

Hash function
128 bit hash
widely used

30
Q

SHA

A

Hash Function
Promoted by NIST
160bit hash value
SHA 1, 2 and 3 versions

31
Q

HAVAL

A

Hash of variable length
Uses MD principle - has variable length
not widely used

32
Q

RipeMD

A

Hash - 128, 256, 320 bit hashes

no longer secure

33
Q

RipeMD160

A

Hash
redesigned RipeMD
Hash of 160bit
Secure

34
Q

PKI

A

public key infrastructure
uses asymmetric and symmetric encryption and hashing to provide and manage certificates
must keep private key secret

35
Q

Digital Signature

A

Provides Integrity and Non repudiation
Email is hashed - hash is encrypted with my private key.
receiver receives and decrypts hash with my public key

36
Q

Digital Certificates

A

Public keys signed with Digital Signature

37
Q

HMAC

A

Hashed Message Authentication Code
it guarantees the integrity of a message during transmission, but it does not provide for nonrepudiation
HMAC can be combined with any standard message digest generation algorithm, such as SHA-3, by using a shared secret key. Therefore, only communicating parties who know the key can generate or verify
the digital signature.

38
Q

DSS

A
Digital Signature Standard by NIST
- all federally approved digital signature algorithms must use the SHA-3
specifies encryption methods:
- Digital Signature Algo (DSA)
- RSA
- Elliptic Curve DSA
39
Q

DSA

A

Public key encryption proposed by NIST
1024 bit key
uses discrete log

40
Q

ECDSA

A

Elliptic Curve DSA

41
Q

PKI

A

Public Key Infra

Trust relationship that provides combining asymmetric with symmetric key encryption

42
Q

Digital Certificate

A

Digital certificates provide communicating parties with the assurance that the people they are communicating with truly are who they claim to be. Digital certificates are essentially endorsed copies of an individual’s public key.

43
Q

CA

A

Certificate authorities (CAs) are the glue that binds the public key infrastructure together. These neutral organizations offer notarization services for digital certificates

44
Q

PGP

A

Pretty Good Privacy
Used for email encryption
Uses web of trust

45
Q

S/MIME

A

Secure/Multipurpose Internet Mail Extensions
de facto standard for encrypted email
uses the RSA encryption algorithm
Used by outlook