Quizz #2 Flashcards
Clipper chip
Encryption chip that government place in every American-made device that have a computer or computer component
ESS
Escrow Encryption Standard
How many key a clipper chip has
each hip has a unit key used to encrypt a copy of each’s user’s session key not the message
LEAF
Law Enforcement Access Field - value included in the chip and sent out
Key escrow
For check and balance purpose, the encryption key is split into two sections and given to two escrows agencies.
how many entities are involved with decryption for check and balance purpose
3 of them : 2 agencies and a law enforcement representative.
Main key pieces to encryption
Algorithms and the keys
what is a key
A string of random bits that will be inserted into the algorithm
Keys used by cryptography algorithm
***Symmetric keys called secret keys ***Asymmetric Keys called public keys
Symmetric or secret Key
Both parties will be using the same key for encryption and decryption. It’s a dual functionality. EACH communication has its own key that is used by a sender and the receiver.
Symmetric formula
n(n-1)/2
What is the security of Symmetric encryption
How well users protect the key.
what does symmetric cryptosystem provides
confidentiality only.They cannot provide authentication or nonrepudation
Example of symmetric key cryptography
***Data encryption Standard (DES) *** Triple DED (3DES) *** Blowfish *** IDEA *** RC4, RC5, RC6
Asymmetric
Each entity has different keys. Two keys are required ( with one to encrypt it, and the second to decrypt).