Key Concepts Flashcards
If unencrypted files were intercepted, which arm of the CIA triad would be breached or violated?
Confidentiality, because the files weren’t
Encrypted.
If the CIA triad is too restrictive to describe an entire situation, what model should you use?
Pakerian hexad
What is symmetric cryptography?
(AKA: Symmetric key cryptography)
Uses a single key to both encrypt the plaintext and decrypt the ciphertext.
They key must be shared between the sender and receiver and anyone with the key can decipher the text.
Name a chief weakness of symmetrical cryptography.
The key must be shared between sender and recipient. If an attacker gets the key, they can potentially compromise confidentiality and integrity.
What is a block cypher?
Takes a predetermined number of bits (or binary digits which are either a 1 or a 0), known as a block, and encrypts that block. Blocks typically have 64 bits but can be higher or lower.
What is a stream cipher?
Encrypts each bit in the plaintext message one bit at a time.
What two types of ciphers does symmetric cryptography make use of?
Block and stream ciphers
What type of cipher is most frequently used in symmetrical cryptography?
Block ciphers.
What kind of encryption is DES?
Symmetric
What kind of encryption is 3DES?
Symmetric
What kind of encryption is AES?
Symmetric
What is DES
Block cipher using a 56 bit key.
What is AES
Symmetrical cipher using 3 different ciphers: one with a 128 bit key, one with a 192 bit key, and one with a 256 bit key. All of which encrypt blocks of 128 bits.
What kind of encryption is Twofish?
Symmetric block cipher
What kind of encryption is Serpent?
Symmetric block cipher
What kind of encryption is Blowfish?
Symmetric block cipher
What kind of encryption is Cast5?
Symmetric block cipher
What kind of encryption is RC6?
Symmetric block cipher
What kind of encryption is IDEA
Symmetric block cipher
What kind of encryption is RC4
Symmetric stream cipher
What kind of encryption is ORYX?
Symmetric stream cipher
What kind of encryption is SEAL?
Symmetric stream cipher
What is asymmetric key cryptography?
Uses two keys: a public key and a private key.
You use the public key to encrypt the data and the private key to decrypt the data. Anyone can access the public key, only the host can access the private key.
What is the main advantage asymmetric cryptography has over symmetric cryptography?
You don’t need to distribute the key.