Quizz #2 Flashcards

1
Q

Clipper chip

A

Encryption chip that government place in every American-made device that have a computer or computer component

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

ESS

A

Escrow Encryption Standard

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

How many key a clipper chip has

A

each hip has a unit key used to encrypt a copy of each’s user’s session key not the message

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

LEAF

A

Law Enforcement Access Field - value included in the chip and sent out

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Key escrow

A

For check and balance purpose, the encryption key is split into two sections and given to two escrows agencies.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

how many entities are involved with decryption for check and balance purpose

A

3 of them : 2 agencies and a law enforcement representative.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Main key pieces to encryption

A

Algorithms and the keys

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

what is a key

A

A string of random bits that will be inserted into the algorithm

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Keys used by cryptography algorithm

A

***Symmetric keys called secret keys ***Asymmetric Keys called public keys

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Symmetric or secret Key

A

Both parties will be using the same key for encryption and decryption. It’s a dual functionality. EACH communication has its own key that is used by a sender and the receiver.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Symmetric formula

A

n(n-1)/2

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is the security of Symmetric encryption

A

How well users protect the key.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

what does symmetric cryptosystem provides

A

confidentiality only.They cannot provide authentication or nonrepudation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Example of symmetric key cryptography

A

***Data encryption Standard (DES) *** Triple DED (3DES) *** Blowfish *** IDEA *** RC4, RC5, RC6

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Asymmetric

A

Each entity has different keys. Two keys are required ( with one to encrypt it, and the second to decrypt).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

How are the two asymmetric keys made up?

A

One public Key and one private key. Both keys are mathematically related, but cannot be derived from each other.

17
Q

What does Asymmetric cryptosystem provides

A

authenticity

18
Q

Secure message format

A

Check for confidentiality - The sender would encrypt the file with the receiver’s public to make sure that only the receiver’s private key is use to decrypt it.

19
Q

open message format

A

Check for authenticity - The sender encrypts the message with her own private key

20
Q

secured and signed format

A

Sender encrypts message with her private key, and then encrypt it again with the receiver’s public key. This provides confidentiality and authenticity.

21
Q

Example of asymmetric key algorithm

A

*** RsA *** Elliptic Curve Cryptosystem (ECC) *** Diffie-Hellman *** El Gamal *** Digital Signature System (DSS)

22
Q

Main Type of symmetric algorithm

A

Block cipher and stream cipher

23
Q

Block Ciphers

A

When used for encryption and decryption purpose, the message is divided into blocks of bit. Block Ciphers use diffusion and confusion in their methods.

24
Q

Stream Ciphers

A

Treats the message as a stream of bits or bytes and performs mathematical functions on them individually

25
Q

Where at stream and block ciphers suitable for implementation

A

** Stream is suitable for hardware **Block is suitable for software

26
Q

Lucifer

A

Is a Data Encryption Standard (DES) developed by IBM.. DES is a symmetric system DES is a block encryption algorithm

27
Q

Mode of operation of DES

A

*** Electronic Code Book Mode (ECB) - a 64 bit data block is entered into the algorithm with a key, and a block of ciphertext is produced. *** Cipher Block Chaining Mode (CBC) *** Cipher Feedback Mode - Ciphertext from the previous block of data is used in encrypting the next block of data. *** Output Feedback Mode -

28
Q

XOR - Exclusive OR

A

Operation that is applied to two bits.

29
Q

AES

A

Advanced Encryption standard - Symmetric block cipher algorithm.

30
Q

Types of Asymmetric Encryption Algorithms

A

RSA - used for digital signatures and encryption. El Gamal - Public key that can be used for digital signatures and key exchanges ECC