Part 1- Text Flashcards
Confusion
In cryptography
The technique of making the relationship between the encryption key and the cipher text as complex and opaque as possible.
Diffusion
In cryptography
The technique of making the cipher text change drastically upon even the slightest changes in the plaintext input.
Collision
In cryptography
The act of two different plain text inputs producing the same exact ciphertext output.
Obfuscation
In cryptography
Makes the source code more difficult to read.
No key is involved.
Less secure than encrypted data.
PRNG
Pseudorandom number generation
In cryptography
The process by which an algorithm produces pseudorandom numbers, which are numbers that approximate randomness without being truly random.
Key generation tends to use pseudorandom numbers.
PFS
Perfect Forward Secrecy
In cryptography
If a key used during a session is compromised, it should not affect data previously encrypted by that key.
Salting
In cryptography
Mitigates the effects of a rainbow table attack by adding random value to each plaintext input
Nonce
In cryptography
Refers to a number used only once.
Explain salt and nonce differences
A salt can change between sessions but it can also stay the same—a nonce, is never repeated.
Salts are typically used in the context of hashing passwords, minced are often used in authentication protocol replay attacks.
Both can be considered initialization vectors.
Data at rest
In cryptography
Is any data that is primarily stored kn various media, rather than moving from one medium to another.
Data in transit
Any data that primarily moves from medium to medium, such as over a private network or the internet
Data in use
Any data that is currently being created, deleted,read from, or written to
Key exchange
Any method by which cryptographic keys are transferred between entities, thus enabling the use of an encryption algorithm.
Two basic types of key exchanges
In-band- uses same path as the data being shared
Out of band uses different path
Symmetric key cryptography requires out of band key exchanges to avoid keys being intercepted.
Digital signature
Message digest that has been encrypted with a users private key.
Asymmetric encryption algorithms can be used with hashing to create digital signatures.
Session key
This is a single use symmetric Key that is used for encrypt in all messages in a single series of related communications
Using session keys can be faster and more efficient than using asymmetric encryption alone
Key stretching
This is a technique that strengthens potentially week cryptographic keys such as passwords or passphrases created by people against brute force attacks.
What are some key stretching techniques?
Repeatedly looping cryptographic hash functions
Repeatedly looping block ciphers
Where the key is used for cipher, configuring the ciphers key schedule to increase the time it takes for the key to be set up.
Low latency
One objective of cryptographic algorithms is to achieve low latency. Where latency is generally defined as the time between when an input is added to the algorithm for processing and when the output is obtained.