Lesson 5 Basic Cryptography Concepts Flashcards

1
Q

Cryptographic systems do what?

A

Cryptography encodes data in a way only authorized users can decode

It is NOT security by obscurity, which merely keeps something secret by hiding it

Encryption is not cryptography, it is a type of cryptography

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Cryptographic algorithms

A

Hashing algorithms
symmetric encryption algorithm
asymmetric encryption algorithm

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Hashing

A

like a fingerprint, one way, anti-collision

used mainly to store pass words

MD5 (message digest) older method of hashing; depricated
SHA (Security Hashing Algorithm) newer using more bits

NOT encryption

collision is when different inputs produce the same outputs - this is BAD
CAT and RAT using MD5 causes a collision and why MD5 is depricated

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

hashing algorithm

A

used to prove integrity

comparing passwords after transfer

comparing files after transfer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Hashing facts

A

prove integrity by:
identical inputs = identical outputs
Good:
longer outputs = less chance for collisions
longer input = less chance for collisions and more strength against cracking
salt - adding something to make password more secure against crackers, rainbow tables, collisions

Bad:
collisions - two different inputs with same output

Considered one-way encryption

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Symmetric Encryption

A

Uses the same key to encrypt and decrypt, similar to a house key

flaw: how to share key w/out compromise

can NOT be used for authentication or integrity because the same secret can be created from the same key, both parties know the key as well

an attacker only needs to intercept the key to unlock the cypher

useful for ‘bulk’ encrypting because it is much faster then asymmetrical encryption

also called single key or shared key or private key (not asymmetrical)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Stream Ciphers

A

symmetrical encryption technique to encrypt streams of data

good for when message length in unknown

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Block Cipher

A

symmetrical encryption technique dividing plaintext in to equal sized blocks of data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

AES

A

Advanced Encryption Standard for block ciphers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Asymmetrical Encryption

A

Used to prove identity, authentication, non-repudiation, key agreement and key exchange

Uses key pairs and is aka Public Key exchange

important: Each key is capable of reversing the operation of its pair (private/public)

The keys are linked in such a way as to make it impossible to derive one from the other, allowing users to share the public key; private key is kept secret

  1. Both parties trade their public keys
  2. Sending encrypted messages:
    Sender encrypts message with recipients public key
    Recipient decrypts message with recipients private key
  3. Signing:
    Sender encrypts signature with senders private key
    Recipient decrypts with senders public key
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Symmetrical vs Asymmetrical - Pros/cons

A

Symmetrical
Pro: Much more efficient/much faster; key lengths are 128-256 bits
Con: need direct access for keys, impossible to have secure exchange

Asymmetrical
Pro: Good for unsecured connection, good key exchange; provides authentication and non-repudiation
Con: Much, much slower; key lengths are 1024-2048 bits

Do bulk in symmetrical
Do keys in asymmetrical

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

RSA

A

Algorithm for deriving key pairs and performing encrypt/decrypt operations

RSA - Rivest/Shamir/Adleman published in 1977

Also called a trapdoor function as it is easy to perform using the public key but difficult to reverse without knowing the private key

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

ECC

A

Elliptic Curve Cryptography which is also a trapdoor function

no known shortcuts to cracking the cypher as there are with RSA

can user smaller keys to obtain same security as RSA

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Digital Signature

A

Using public key crypto with hashing

Provides integrity, authentication and non-repudiatioin

uses RSA

  1. sender creates hash of message and encrypts hash with private key
  2. sender attaches digital signature to original message
  3. recipient decrypts the signature using sender public key, resulting in original hash
  4. recipient calculates own checksum for the message, and compares the two hashes

if hashes match means message has not been altered
Sender identity is also proven, authenticated

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

DSA

A

Another digital signature algorithm but using ECC instead of RSA

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Digital Envelops and key exchanges

A

Process to overcome the deficiencies of asymmetrical and symmetrical encryption techniques

  1. Sender obtains recipient (rec) public key
  2. Sender encrypts message using her symmetrical key (private/secret key) Also known as a session key
  3. Sender encrypts the session key with recipient public key (asymmetrical encryption)
  4. Sender attaches encrypted session key to the cipher text message in a digital envelope and sends to the recipient
  5. Recipient uses his private key to decrypt the session key (asymmetrical encryption)
  6. Recipient uses the session key to decrypt the cipher text message (symmetrical encryption)
17
Q

Digital Certificate

A

A method for ensuring identity of the person or server issuing a public key

Uses a CA (certificate authority) as a third party to validate the owner of a public key

The CA issues a certificate signed by the CA

If the recipient trusts the CA, they can trust the public key wrapped in the subjects certificate

This process is known as PKI - public key infrastructure

18
Q

Perfect Forward Secrecy

A

Allows two parties to derive the same secret value that an attacker cannot guess

mitigates the issue of a private key being compromised allowing previously captured transmissions to be deciphered

uses Diffie-Hellman (D-H) key agreement protocols

19
Q

Cipher Suite

A

a signature algorithm to prove messages were created by the server

used to bulk encrypt data

uses session keys to keep data confidential

20
Q

Bulk Encryption

A

uses symmetrical encryption AES

21
Q

Key Exchange

A

uses asymmetrical encryption (RSA/D-H/ECC)

22
Q

Signature

A

uses asymmetrical encryption (DSA)

23
Q

Unauthenticated

A

does not use a hash
cannot prove integrity
vulnerable to insertion and modification attacks

24
Q

Authenticated

A

uses a hash of the combination of the message and a shared secret

Message Authentication Code (MAC)

vulnerable to padding oracle attacks

25
Q

AEAD

A

Authenticated Encryption with Additional Data

associates message with context to prevent replay

26
Q

Hybrid encryption

A

Makes use of asymmetrical and symmetrical encryption

bulk uses symmetrical and protected by the public key (asymmetrical ) cryptography

27
Q

File Encryption

A

private key encrypts the symmetric key

use of key is locked to a users account credential

28
Q

Transport encryption

A

uses a session key exchange/agreement

29
Q

MitM

A

Man in the Middle aka On Path Attack

interferes with public key presented to the client

30
Q

Downgrade Attack

A

Forces server into using weak protocol versions and ciphers

31
Q

Key stretching

A

Taking a key generated from a users password and repeatedly converts it to a longer and more random key

Uses hashing to do this

Slows the attacker down

Password-Based Key Derivation Function 2 (PBKDF2) is widely used for this purpose

PBDKDF2 is used in wifi protected Access (WPA)

32
Q

Salting

A

a method of adding additional information to a password prior to hashing

increases difficulty for attack to ‘guess’ the password by comparing to known hash values such as dictionary words

The salt is no kept secret as the system verifying the hash must know it

33
Q

Birthday attack

A

a brute force attack aimed at exploiting collisions in a hash function

The time is takes to create a message with the same hash as the original message does not take a much time as one might think, similar to the odds of a room of people and two people having the same birthday

34
Q

Homomorphic encryption

A

Allows a user to decrypt the needed data without decrypting the sensitive data, like PII, allowing for user to perform actions on the data

35
Q

Blockchain

A

uses a public ledger which is encrypted, based on non-repudiation

the ledger is shared to all users

36
Q

Steganography

A

utilize obfuscation to hide data in plain site, such as text in an image file