Lecture 8 Flashcards

1
Q

Cryptography: comes from ?

Identify

Cryptology

A

Greek

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Cryptography: Kryptos means ?

Identify

Cryptology

A

hidden

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Cryptography: Grahein means ?

Identify

Cryptology

A

to write

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

?

Process of making and using codes to secure the transmission of information

Identify

Cryptology

A

Cryptography

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

?

Process of obtaining the original message form encrypted message

Identify

Cryptology

A

Cryptanalysis

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

?

Process of converting an original message into a form that is unreadable to unauthorized individuals

Identify

Cryptology

A

Encryption

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

?

Process of converting the encrypted message (cipertext) into an easily read message (plain text)

Identify

Cryptology

A

Decryption

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

?

Programmatic steps to encrypt message

Identify

Cryptology - Basic Definitions

A

Algorithm

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

?

Encryption method or process

Identify

Cryptology - Basic Definitions

A

Cipher

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

?

Encrypted message

Identify

Cryptology - Basic Definitions

A

Ciphertext or cryptogram

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

?

Process of converting unencrypted components into encrypted components

Identify

Cryptology - Basic Definitions

A

Code

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

?

Convert to plaintext

Identify

Cryptology - Basic Definitions

A

Decipher

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

?

To encrypt

Identify

Cryptology - Basic Definitions

A

Encipher

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

?

Information used with the algorithm to encrypt

Identify

Cryptology - Basic Definitions

A

Key or crypto-variable

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

?

Entire range of values that can possibly be used to construct an individual key

Identify

Cryptology - Basic Definitions

A

Key-space

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

?

Series of encryptions /decryptions between a number of systems

Identify

Cryptology - Basic Definitions

A

Link encryption

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

?

The original message

Identify

Cryptology - Basic Definitions

A

Plaintext or clear text

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

?

Process of hiding messages

Identify

Cryptology - Basic Definitions

A

Steganography

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

?

Amount - effort required to perform cryptanalysis

Identify

Cryptology - Basic Definitions

A

Work factor

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

? ??

(2) Cipher methods

Enumerate

Cryptology - Cipher methods

A
  • Bit stream method
  • Block cipher method
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

?

Each bit in the plaintext is transformed bit by bit

Identify

Cryptology - 1/2 Cipher methods 1/2 ?

A

Bit stream method

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

?

Most common use XOR

Identify

Cryptology - 1/2 Cipher methods 2/2 ?

A

Bit stream method

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

?

Messaged divided into blocks

Identify

Cryptology - 2/2 Cipher methods 1/3 ?

A

Block cipher method

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

?

Each block is encoded

Identify

Cryptology - 2/2 Cipher methods 2/3 ?

A

Block cipher method

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
# **?** Substitution, transposition, **XOR or combination** | Identify ## Footnote Cryptology - 2/2 Cipher methods 3/3 ?
Block cipher method
26
# **?** **Substitute** one value for another | Identify ## Footnote Cryptology - 1/3 ?
Substitution Cipher
27
# **?** 3 character **substitution** to the right | Identify ## Footnote Cryptology - 2/3 ?
Substitution Cipher
28
# **?** **Simple by itself** – **powerful when combined** with other operations | Identify ## Footnote Cryptology - 3/3 ?
Substitution Cipher
29
# **?** 3 shift to the right is know as the **?** | Identify ## Footnote Cryptology - Substitution Cipher
Caesar Cipher
30
# **?** Implemented using the **Vigenere Square** | Identify ## Footnote Cryptology - 1/6 ?
Vigenere Cipher
31
# **?** **26 distinct** cipher alphabets | Identify ## Footnote Cryptology - 2/6 ?
Vigenere Cipher
32
# **?** **Header row** – normal order | Identify ## Footnote Cryptology - 3/6 ?
Vigenere Cipher
33
# **?** Each **additional row** – shift right | Identify ## Footnote Cryptology - 4/6 ?
Vigenere Cipher
34
# **?** **Start in first row** and find a substitution for one letter | Identify ## Footnote Cryptology - 5/6 ?
Vigenere Cipher
35
# **?** **Move down the rows** for each subsequent letter of plaintext | Identify ## Footnote Cryptology - 6/6 ?
Vigenere Cipher
36
# **?** Simply rearranges the values **within a block** | Identify ## Footnote Cryptology - 1/4 ?
Transposition Cipher
37
# **?** Can be done at the **bit level or the byte level** | Identify ## Footnote Cryptology - 2/4 ?
Transposition Cipher
38
# **?** **Julius Caesar was associated with the early version** of this cipher also | Identify ## Footnote Cryptology - 3/4 ?
Transposition Cipher
39
# **?** **Larger blocks** or keys makes cipher stronger | Identify ## Footnote Cryptology - 4/4 ?
Transposition Cipher
40
# **?** * Function of Boolean algebra * Two bits are compared * If identical, result is binary 0 * If not identical, result is binary 1 | Identify ## Footnote Cryptology - 1/2 ?
Exclusive OR (XOR)
41
# **?** * Very simple encryption * Not very secure | Identify ## Footnote Cryptology - 2/2 ?
Exclusive OR (XOR)
42
# **?** **One-time pad** | Identify ## Footnote Cryptology - 1/4 ?
Vernam Cipher
43
# **?** **Uses a set of characters only one time** for each encryption process | Identify ## Footnote Cryptology - 2/4 ?
Vernam Cipher
44
# **?** * **Each character of the plaintext is turned into a number** and a **pad value** for that position is added * Sum is then converted back to a cipher text | Identify ## Footnote Cryptology - 3/4 ?
Vernam Cipher
45
# **?** **Decryption requires knowledge** of **pad values** or difficult cryptanalysis. | Identify ## Footnote Cryptology - 4/4 ?
Vernam Cipher
46
# **?** **List of codes representing a page number**, line number, and word number of the plaintext word. | Identify ## Footnote Cryptology - Book or Running Key Cipher
Cipher text
47
# **?** Not an encryption methodology | Identify ## Footnote Cryptology - 1/5 ?
Hash functions
48
# **?** * **Fingerprinting** * Used to determine if it is **the same message** * **Not used to decypher** | Identify ## Footnote Cryptology - 2/5 ?
Hash functions
49
# **?** Message always provide **same hash value if unaltered** | Identify ## Footnote Cryptology - 3/5 ?
Hash functions
50
# **?** * **Do not require keys** * Uses **Message Authentication Code (MAC)** | Identify ## Footnote Cryptology - 4/5 ?
Hash functions
51
# **?** * **Key-dependent** * Used in **password verification systems** | Identify ## Footnote Cryptology - 5/5 ?
Hash functions
52
# **?** generates a message summary or digest | Identify ## Footnote Cryptology - Hash functions
Mathematical algorithm
53
# **?** Secure algorithm | Identify ## Footnote Cryptology - 1/3 ?
Secure Hash Standard (SHS)
54
# **?** **Standard issued** by **National Institute of Standards and Technology (NIST)** | Identify ## Footnote Cryptology - 2/3 ?
Secure Hash Standard (SHS)
55
# **?** * **SHA-1** Produces a 160 bit digest * **Family of SHA** | Identify ## Footnote Cryptology - 3/3 ?
Secure Hash Standard (SHS)
56
# **?** A 256-bit cipher algorithm | Identify ## Footnote Cryptology - Secure Hash Standard (SHS) - 1/2 ?
SHA-256
57
# **?** **Creates a key** - **encrypting the intermediate hash value** with the message block functioning as the key | Identify ## Footnote Cryptology - Secure Hash Standard (SHS) - 2/2 ?
SHA-256
58
# **?** **Symmetric and asymmetric** and hybrid | Identify ## Footnote Cryptology
Cryptographic Algorithms
59
# **?** * Requires the **same secret key** * Encryption methods use **mathematical operations** | Identify ## Footnote Cryptology - Cryptographic Algorithms - 1/3 ?
Symmetric Encryption
60
# **?** Both the **sender and receiver must have the secret key** | Identify ## Footnote Cryptology - Cryptographic Algorithms - 2/3 ?
Symmetric Encryption
61
# **?** **Primary challenge** – **getting key to receiver** | Identify ## Footnote Cryptology - Cryptographic Algorithms - 3/3 ?
Symmetric Encryption
62
# **?** * Uses **two different but related keys** * Either key **can encrypt or decrypt** * **Must use other to perform other function** | Identify ## Footnote Cryptology - Cryptographic Algorithms - 1/5 ?
Asymmetric Encryption
63
# **?** * One key private * One key public | Identify ## Footnote Cryptology - Cryptographic Algorithms - 2/5 ?
Asymmetric Encryption
64
# **?** * Also know as public key encryption | Identify ## Footnote Cryptology - Cryptographic Algorithms - 3/5 ?
Asymmetric Encryption
65
# **?** * Based on one-way functions * One is simple to compute , the opposite is complex | Identify ## Footnote Cryptology - Cryptographic Algorithms - 4/5 ?
Asymmetric Encryption
66
# **?** * Based on **hash value** * Uses **mathematical trapdoor** | Identify ## Footnote Cryptology - Cryptographic Algorithms - 5/5 ?
Asymmetric Encryption
67
# **?** that enable you to easily accomplish the reverse function in a one-way function. | Identify ## Footnote Cryptology - Cryptographic Algorithms - Asymmetric Encryption
Secret mechanism
68
# **?** becomes the true key | Identify ## Footnote Cryptology - Cryptographic Algorithms - Asymmetric Encryption
Public key
69
# **?** is derived form public key using trapdoor | Identify ## Footnote Cryptology - Cryptographic Algorithms - Asymmetric Encryption
Private
70
# **?** First public key encryption algorithm | Identify ## Footnote Cryptology - Public Key - 1/3 ?
RSA (Rivest-Shamir-Adlemann)
71
# **?** * Published for commercial use * E-commerce browsers | Identify ## Footnote Cryptology - Public Key - 2/3 ?
RSA (Rivest-Shamir-Adlemann)
72
# **?** Has become the de facto standard | Identify ## Footnote Cryptology - Public Key - 3/3 ?
RSA (Rivest-Shamir-Adlemann)
73
# **?** * **Cryptovariable or key size** must be decided * **Length of key** increase the number of random selections to be guessed * **Length of key** influences strength | Identify ## Footnote Cryptology - 1/2 ?
Encryption Key Size
74
# **?** * The **security of encrypted data** is NOT dependent on keeping the algorithm secret * Depends on keeping some or **all of the elements of the keys secret** | Identify ## Footnote Cryptology - 2/2 ?
Encryption Key Size
75
# **?** **Integrated system of software**, encryption methodologies, protocols, legal agreements, and 3rd part services | Identify ## Footnote Cryptology - 1/2 ?
Public Key Infrastructure (PKI)
76
# **?** * Based on public key * Include **digital certificates** and **certificate authorities** | Identify ## Footnote Cryptology - 1/2 ?
Public Key Infrastructure (PKI)
77
# **?** * Based on public key * Include **digital certificates** and **certificate authorities** | Identify ## Footnote Cryptology - 2/2 ?
Public Key Infrastructure (PKI)
78
# **?** **Public key container files** that **allow computer program to validate the key** and identify to whom it belongs. | Identify ## Footnote Cryptology
Digital Certificates
79
# **?** **??** **???** **????** **?????** (5) Key characteristics to be integrated into business practices | Identify ## Footnote Cryptology - Digital Certificates
* Authentication * Integrity * Privacy * Authorization * Non-repudiation
80
# **?** * Used by third party * **Certifies the authenticity** of the * **Digital signature is attached** | Identify ## Footnote Cryptology
Digital Certificate
81
# **?** **Created to verify information** transferred **using electronic systems** | Identify ## Footnote Cryptology - 1/4 ?
Digital Signatures
82
# **?** **Currently asymmetric encryption processes** are used to create digital signatures | Identify ## Footnote Cryptology - 2/4 ?
Digital Signatures
83
# **?** **Encrypted messages** that can be **mathematically authentic** | Identify ## Footnote Cryptology - 3/4 ?
Digital Signatures
84
# **?** Used when using **DSS (digital Signature Standard)** | Identify ## Footnote Cryptology - 4/4 ?
Digital Signatures
85
# **?** **Pure asymmetric keys encryption** is not widely used except in digital certificates | Identify ## Footnote Cryptology - 1/3 ?
Hybrid Cryptography Systems
86
# **?** More widely used as part of **hybrid system** | Identify ## Footnote Cryptology - 2/3 ?
Hybrid Cryptography Systems
87
# **?** **Diffie-Hellman Key Exchange method** | Identify ## Footnote Cryptology - 3/3 ?
Hybrid Cryptography Systems
88
# **?** Process of hiding information | Identify ## Footnote Cryptology - 1/4 ?
Steganography
89
# **?** Not technically a form of cryptography | Identify ## Footnote Cryptology - 2/4 ?
Steganography
90
# **?** Use **one bit per color** or **bits per pixel**o store information | Identify ## Footnote Cryptology - 3/4 ?
Steganography
91
# **?** Compute files that **don’t use all available bits** | Identify ## Footnote Cryptology - 4/4 ?
Steganography
92
# **?** **??** (2) Protocols for Secure Communication | Enumerate ## Footnote Cryptology - Protocols for Secure Communication
* Secure Socket Layer (SSL) * Secure Hypertext Transfer Protocol (S-HTTP)
93
# **?** Used public key encryption to secure channel | Identify ## Footnote Cryptology - 1/2 Protocols for Secure Communication
Secure Socket Layer (SSL)
94
# **?** **??** Two layers of Protocol | Enumerate ## Footnote Cryptology - 1/2 Protocols for Secure Communication - SSL
* SSL Record Protocol * Standard HTTP
95
# **?** * Compression, encryption and attachment of **SSL header** * **Received encrypted messages are decrypted and reassembled** * Basic security at top level of **SSL protocol stack** | Identify ## Footnote Cryptology - 1/2 Protocols for Secure Communication - SSL - 1/2 Layers of protocol
SSL Record Protocol
96
# **?** Internet communication services | Identify ## Footnote Cryptology - 1/2 Protocols for Secure Communication - SSL - 2/2 Layers of protocol
Standard HTTP
97
# **?** **Extended version** of **hypertext transfer protocol** | Identify ## Footnote Cryptology - 2/2 Protocols for Secure Communication 1/3 ?
Secure Hypertext Transfer Protocol (S-HTTP)
98
# **?** **Provides for encryption of individual messages** between client and server | Identify ## Footnote Cryptology - 2/2 Protocols for Secure Communication 2/3 ?
Secure Hypertext Transfer Protocol (S-HTTP)
99
# **?** * No session * Designed for **sending individual messages** | Identify ## Footnote Cryptology - 2/2 Protocols for Secure Communication 3/3 ?
Secure Hypertext Transfer Protocol (S-HTTP)
100
# **?** Adds encryption of **MIME (Multipurpose Internet Mail Extensions)** | Identify ## Footnote Cryptology - Securing E-mail
Secure Multipurpose Internet mail Extensions (S/MIME)
101
# **?** Uses 3DES symmetric key encryption and RSA for key | Identify ## Footnote Cryptology - Securing E-mail
PEM
102
# **?** * Pretty Good Privacy * Used IDEA Cipher | Identify ## Footnote Cryptology - Securing E-mail
PGP