Lecture 8 Flashcards

1
Q

Cryptography: comes from ?

Identify

Cryptology

A

Greek

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Cryptography: Kryptos means ?

Identify

Cryptology

A

hidden

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Cryptography: Grahein means ?

Identify

Cryptology

A

to write

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

?

Process of making and using codes to secure the transmission of information

Identify

Cryptology

A

Cryptography

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

?

Process of obtaining the original message form encrypted message

Identify

Cryptology

A

Cryptanalysis

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

?

Process of converting an original message into a form that is unreadable to unauthorized individuals

Identify

Cryptology

A

Encryption

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

?

Process of converting the encrypted message (cipertext) into an easily read message (plain text)

Identify

Cryptology

A

Decryption

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

?

Programmatic steps to encrypt message

Identify

Cryptology - Basic Definitions

A

Algorithm

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

?

Encryption method or process

Identify

Cryptology - Basic Definitions

A

Cipher

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

?

Encrypted message

Identify

Cryptology - Basic Definitions

A

Ciphertext or cryptogram

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

?

Process of converting unencrypted components into encrypted components

Identify

Cryptology - Basic Definitions

A

Code

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

?

Convert to plaintext

Identify

Cryptology - Basic Definitions

A

Decipher

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

?

To encrypt

Identify

Cryptology - Basic Definitions

A

Encipher

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

?

Information used with the algorithm to encrypt

Identify

Cryptology - Basic Definitions

A

Key or crypto-variable

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

?

Entire range of values that can possibly be used to construct an individual key

Identify

Cryptology - Basic Definitions

A

Key-space

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

?

Series of encryptions /decryptions between a number of systems

Identify

Cryptology - Basic Definitions

A

Link encryption

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

?

The original message

Identify

Cryptology - Basic Definitions

A

Plaintext or clear text

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

?

Process of hiding messages

Identify

Cryptology - Basic Definitions

A

Steganography

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

?

Amount - effort required to perform cryptanalysis

Identify

Cryptology - Basic Definitions

A

Work factor

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

? ??

(2) Cipher methods

Enumerate

Cryptology - Cipher methods

A
  • Bit stream method
  • Block cipher method
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

?

Each bit in the plaintext is transformed bit by bit

Identify

Cryptology - 1/2 Cipher methods 1/2 ?

A

Bit stream method

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

?

Most common use XOR

Identify

Cryptology - 1/2 Cipher methods 2/2 ?

A

Bit stream method

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

?

Messaged divided into blocks

Identify

Cryptology - 2/2 Cipher methods 1/3 ?

A

Block cipher method

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

?

Each block is encoded

Identify

Cryptology - 2/2 Cipher methods 2/3 ?

A

Block cipher method

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

?

Substitution, transposition, XOR or combination

Identify

Cryptology - 2/2 Cipher methods 3/3 ?

A

Block cipher method

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

?

Substitute one value for another

Identify

Cryptology - 1/3 ?

A

Substitution Cipher

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

?

3 character substitution to the right

Identify

Cryptology - 2/3 ?

A

Substitution Cipher

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

?

Simple by itselfpowerful when combined with other operations

Identify

Cryptology - 3/3 ?

A

Substitution Cipher

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

?

3 shift to the right is know as the ?

Identify

Cryptology - Substitution Cipher

A

Caesar Cipher

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q

?

Implemented using the Vigenere Square

Identify

Cryptology - 1/6 ?

A

Vigenere Cipher

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
31
Q

?

26 distinct cipher alphabets

Identify

Cryptology - 2/6 ?

A

Vigenere Cipher

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
32
Q

?

Header row – normal order

Identify

Cryptology - 3/6 ?

A

Vigenere Cipher

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
33
Q

?

Each additional row – shift right

Identify

Cryptology - 4/6 ?

A

Vigenere Cipher

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
34
Q

?

Start in first row and find a substitution for one letter

Identify

Cryptology - 5/6 ?

A

Vigenere Cipher

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
35
Q

?

Move down the rows for each subsequent letter of plaintext

Identify

Cryptology - 6/6 ?

A

Vigenere Cipher

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
36
Q

?

Simply rearranges the values within a block

Identify

Cryptology - 1/4 ?

A

Transposition Cipher

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
37
Q

?

Can be done at the bit level or the byte level

Identify

Cryptology - 2/4 ?

A

Transposition Cipher

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
38
Q

?

Julius Caesar was associated with the early version of this cipher also

Identify

Cryptology - 3/4 ?

A

Transposition Cipher

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
39
Q

?

Larger blocks or keys makes cipher stronger

Identify

Cryptology - 4/4 ?

A

Transposition Cipher

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
40
Q

?

  • Function of Boolean algebra
  • Two bits are compared
  • If identical, result is binary 0
  • If not identical, result is binary 1

Identify

Cryptology - 1/2 ?

A

Exclusive OR (XOR)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
41
Q

?

  • Very simple encryption
  • Not very secure

Identify

Cryptology - 2/2 ?

A

Exclusive OR (XOR)

42
Q

?

One-time pad

Identify

Cryptology - 1/4 ?

A

Vernam Cipher

43
Q

?

Uses a set of characters only one time for each encryption process

Identify

Cryptology - 2/4 ?

A

Vernam Cipher

44
Q

?

  • Each character of the plaintext is turned into a number and a pad value for that position is added
  • Sum is then converted back to a cipher text

Identify

Cryptology - 3/4 ?

A

Vernam Cipher

45
Q

?

Decryption requires knowledge of pad values or difficult cryptanalysis.

Identify

Cryptology - 4/4 ?

A

Vernam Cipher

46
Q

?

List of codes representing a page number, line number, and word number of the plaintext word.

Identify

Cryptology - Book or Running Key Cipher

A

Cipher text

47
Q

?

Not an encryption methodology

Identify

Cryptology - 1/5 ?

A

Hash functions

48
Q

?

  • Fingerprinting
  • Used to determine if it is the same message
  • Not used to decypher

Identify

Cryptology - 2/5 ?

A

Hash functions

49
Q

?

Message always provide same hash value if unaltered

Identify

Cryptology - 3/5 ?

A

Hash functions

50
Q

?

  • Do not require keys
  • Uses Message Authentication Code (MAC)

Identify

Cryptology - 4/5 ?

A

Hash functions

51
Q

?

  • Key-dependent
  • Used in password verification systems

Identify

Cryptology - 5/5 ?

A

Hash functions

52
Q

?

generates a message summary or digest

Identify

Cryptology - Hash functions

A

Mathematical algorithm

53
Q

?

Secure algorithm

Identify

Cryptology - 1/3 ?

A

Secure Hash Standard (SHS)

54
Q

?

Standard issued by National Institute of Standards and Technology (NIST)

Identify

Cryptology - 2/3 ?

A

Secure Hash Standard (SHS)

55
Q

?

  • SHA-1 Produces a 160 bit digest
  • Family of SHA

Identify

Cryptology - 3/3 ?

A

Secure Hash Standard (SHS)

56
Q

?

A 256-bit cipher algorithm

Identify

Cryptology - Secure Hash Standard (SHS) - 1/2 ?

A

SHA-256

57
Q

?

Creates a key - encrypting the intermediate hash value with the message block functioning as the key

Identify

Cryptology - Secure Hash Standard (SHS) - 2/2 ?

A

SHA-256

58
Q

?

Symmetric and asymmetric and hybrid

Identify

Cryptology

A

Cryptographic Algorithms

59
Q

?

  • Requires the same secret key
  • Encryption methods use mathematical operations

Identify

Cryptology - Cryptographic Algorithms - 1/3 ?

A

Symmetric Encryption

60
Q

?

Both the sender and receiver must have the secret key

Identify

Cryptology - Cryptographic Algorithms - 2/3 ?

A

Symmetric Encryption

61
Q

?

Primary challengegetting key to receiver

Identify

Cryptology - Cryptographic Algorithms - 3/3 ?

A

Symmetric Encryption

62
Q

?

  • Uses two different but related keys
  • Either key can encrypt or decrypt
  • Must use other to perform other function

Identify

Cryptology - Cryptographic Algorithms - 1/5 ?

A

Asymmetric Encryption

63
Q

?

  • One key private
  • One key public

Identify

Cryptology - Cryptographic Algorithms - 2/5 ?

A

Asymmetric Encryption

64
Q

?

  • Also know as public key encryption

Identify

Cryptology - Cryptographic Algorithms - 3/5 ?

A

Asymmetric Encryption

65
Q

?

  • Based on one-way functions
  • One is simple to compute , the opposite is complex

Identify

Cryptology - Cryptographic Algorithms - 4/5 ?

A

Asymmetric Encryption

66
Q

?

  • Based on hash value
  • Uses mathematical trapdoor

Identify

Cryptology - Cryptographic Algorithms - 5/5 ?

A

Asymmetric Encryption

67
Q

?

that enable you to easily accomplish the reverse function in a one-way function.

Identify

Cryptology - Cryptographic Algorithms - Asymmetric Encryption

A

Secret mechanism

68
Q

?

becomes the true key

Identify

Cryptology - Cryptographic Algorithms - Asymmetric Encryption

A

Public key

69
Q

?

is derived form public key using trapdoor

Identify

Cryptology - Cryptographic Algorithms - Asymmetric Encryption

A

Private

70
Q

?

First public key encryption algorithm

Identify

Cryptology - Public Key - 1/3 ?

A

RSA (Rivest-Shamir-Adlemann)

71
Q

?

  • Published for commercial use
  • E-commerce browsers

Identify

Cryptology - Public Key - 2/3 ?

A

RSA (Rivest-Shamir-Adlemann)

72
Q

?

Has become the de facto standard

Identify

Cryptology - Public Key - 3/3 ?

A

RSA (Rivest-Shamir-Adlemann)

73
Q

?

  • Cryptovariable or key size must be decided
  • Length of key increase the number of random selections to be guessed
  • Length of key influences strength

Identify

Cryptology - 1/2 ?

A

Encryption Key Size

74
Q

?

  • The security of encrypted data is NOT dependent on keeping the algorithm secret
  • Depends on keeping some or all of the elements of the keys secret

Identify

Cryptology - 2/2 ?

A

Encryption Key Size

75
Q

?

Integrated system of software, encryption methodologies, protocols, legal agreements, and 3rd part services

Identify

Cryptology - 1/2 ?

A

Public Key Infrastructure (PKI)

76
Q

?

  • Based on public key
  • Include digital certificates and certificate authorities

Identify

Cryptology - 1/2 ?

A

Public Key Infrastructure (PKI)

77
Q

?

  • Based on public key
  • Include digital certificates and certificate authorities

Identify

Cryptology - 2/2 ?

A

Public Key Infrastructure (PKI)

78
Q

?

Public key container files that allow computer program to validate the key and identify to whom it belongs.

Identify

Cryptology

A

Digital Certificates

79
Q

? ?? ??? ???? ?????

(5) Key characteristics to be integrated into business practices

Identify

Cryptology - Digital Certificates

A
  • Authentication
  • Integrity
  • Privacy
  • Authorization
  • Non-repudiation
80
Q

?

  • Used by third party
  • Certifies the authenticity of the
  • Digital signature is attached

Identify

Cryptology

A

Digital Certificate

81
Q

?

Created to verify information transferred using electronic systems

Identify

Cryptology - 1/4 ?

A

Digital Signatures

82
Q

?

Currently asymmetric encryption processes are used to create digital signatures

Identify

Cryptology - 2/4 ?

A

Digital Signatures

83
Q

?

Encrypted messages that can be mathematically authentic

Identify

Cryptology - 3/4 ?

A

Digital Signatures

84
Q

?

Used when using DSS (digital Signature Standard)

Identify

Cryptology - 4/4 ?

A

Digital Signatures

85
Q

?

Pure asymmetric keys encryption is not widely used except in digital certificates

Identify

Cryptology - 1/3 ?

A

Hybrid Cryptography Systems

86
Q

?

More widely used as part of hybrid system

Identify

Cryptology - 2/3 ?

A

Hybrid Cryptography Systems

87
Q

?

Diffie-Hellman Key Exchange method

Identify

Cryptology - 3/3 ?

A

Hybrid Cryptography Systems

88
Q

?

Process of hiding information

Identify

Cryptology - 1/4 ?

A

Steganography

89
Q

?

Not technically a form of cryptography

Identify

Cryptology - 2/4 ?

A

Steganography

90
Q

?

Use one bit per color or bits per pixelo store information

Identify

Cryptology - 3/4 ?

A

Steganography

91
Q

?

Compute files that don’t use all available bits

Identify

Cryptology - 4/4 ?

A

Steganography

92
Q

? ??

(2) Protocols for Secure Communication

Enumerate

Cryptology - Protocols for Secure Communication

A
  • Secure Socket Layer (SSL)
  • Secure Hypertext Transfer Protocol (S-HTTP)
93
Q

?

Used public key encryption to secure channel

Identify

Cryptology - 1/2 Protocols for Secure Communication

A

Secure Socket Layer (SSL)

94
Q

? ??

Two layers of Protocol

Enumerate

Cryptology - 1/2 Protocols for Secure Communication - SSL

A
  • SSL Record Protocol
  • Standard HTTP
95
Q

?

  • Compression, encryption and attachment of SSL header
  • Received encrypted messages are decrypted and reassembled
  • Basic security at top level of SSL protocol stack

Identify

Cryptology - 1/2 Protocols for Secure Communication - SSL - 1/2 Layers of protocol

A

SSL Record Protocol

96
Q

?

Internet communication services

Identify

Cryptology - 1/2 Protocols for Secure Communication - SSL - 2/2 Layers of protocol

A

Standard HTTP

97
Q

?

Extended version of hypertext transfer protocol

Identify

Cryptology - 2/2 Protocols for Secure Communication 1/3 ?

A

Secure Hypertext Transfer Protocol (S-HTTP)

98
Q

?

Provides for encryption of individual messages between client and server

Identify

Cryptology - 2/2 Protocols for Secure Communication 2/3 ?

A

Secure Hypertext Transfer Protocol (S-HTTP)

99
Q

?

  • No session
  • Designed for sending individual messages

Identify

Cryptology - 2/2 Protocols for Secure Communication 3/3 ?

A

Secure Hypertext Transfer Protocol (S-HTTP)

100
Q

?

Adds encryption of MIME (Multipurpose Internet Mail Extensions)

Identify

Cryptology - Securing E-mail

A

Secure Multipurpose Internet mail Extensions (S/MIME)

101
Q

?

Uses 3DES symmetric key encryption and RSA for key

Identify

Cryptology - Securing E-mail

A

PEM

102
Q

?

  • Pretty Good Privacy
  • Used IDEA Cipher

Identify

Cryptology - Securing E-mail

A

PGP