Section 24 - Crytography Flashcards
What is cryptography?
The practice and study of writing and solving codes in order to hide the true meaning of the information
This is done by converting ordinary information known as “plaintext” into an unintelligible format known as “ciphertext”
*** This is most commonly used as a form of encryption
Encryption is used to provide us data…?
Data at rest
Data in transit
Data in use
What is data at rest?
It’s inactive data that is archived such as data that’s resident on a hard drive
*** Example of this is just data sitting there in a file
What is data in transit?
Data that’s cross the network or data that’s residing inside the computer’s memory, the RAM, as it’s waiting to be processed
*** This is when we start moving that data around
What is data in use?
Data in use means it is currently undergoing constant change
*** So there’s data inside your processor and calculations are being done
What is an algorithm?
A mathematical formula that tells you how we’re going to encrypt or decrypt something
What is the key in an algorithm?
The essential piece of information that determines the output of a cipher
*** The key is the key to the security inside encryption
Encryption ciphers are categorized as either…?
Symmetric or asymmetric algorithms
The type of encryption cipher is based on the ___ that they utilize to secure the data.
Key
With a symmetric key encryption, you’re going to have a ___ key that’s used to encrypt and decrypt data.
single
With asymmetric encryption, you’re going to use ___ ___ keys.
two different
** one key is used to encrypt the data and one key is used to decrypt the data
Symmetric key algorithms are often called what?
Private Key Encryption
*** This is because the sender and the receiver need to know the same shared secret, the key, since it only uses a single one.
What are two challenges with using Symmetric Key algorithms?
- Due to non-repudiation, it can be a challenge to prove who used the key. So, if you live in a house with several roomates then you all share the same house key. But if your laptop get stolen while you’re out, you won’t know which of those roomates took it.
- Distribution of that shared secret key
Asymmetric algorithms are often referred to as…?
Public Key Cryptography
In addition to classifying algorithms as symmetric or asymmetric based on their key type, we also categorize an algorithm as a ___ ___ or a ___ ___ based on the mathematical algorithm that they’re using to do their encryption/decryption.
stream cipher
block cipher
What are the differences between stream ciphers and block ciphers?
Stream ciphers perform their computations a single byte at a time. Making it a bit by bit process. A block cipher is able to break the input into fixed length blocks of data before performing encryption.
What is hybrid implementation?
Utilizes asymmetric encryption to securely transfer a private key that can then be used with symmetric encryption
What are some common symmetric algorithms that you should know?
DES
triple DES
IDEA
AES
Blowfish
Twofish
Rivest Ciphers
RC4
RC5
RC6
What is DES?
Data Encryption Standard
This uses a 64 bit key with 8 bits of that being used for parity
*** This means it only has an effective key length of 56-bits
What is triple DES?
Written as 3DES this is an upgraded version of the original DES.
There are three 56-bit keys used.
The input data was subjected to encryption through the DES algorithm with the first key and decrypted through the algorithm using the second key
This created an algorithm that had a 112-bit key but was three times slower than DES because of all the back and forth encryption