Security Flashcards
Encryption
Modifying data to make it unreadable to miscreants
Nonrepudiation
The process that guarantees that the data is the same as original sent, came from the bona fide source
Authentication
Verifying that whoever is accessing the data is who they claim to be. The computer that is trying to connect must present some form of credential to be allowed access to the network.
Authorization
Verifying that whoever is accessing the data should be able to do so. Once authenticated, the computer determines what the device can and cannot do on the network.
Accounting
The logging of authentications and authorizations. The authenticating server should do some form of accounting fo who is logging in and when, number of unsuccessful logins, etc.
Cipher
A series of algorithms (complex and hard to reverse) that is run on data to encrypt it
Complete algorithm
A combination of a cipher and an implementation method for it
XOR
“eXclusive OR.” A logical operation that compares to inputs and outputs true (i.e. “1”) if both inputs differ, otherwise it outputs false (i.e., “0”).
Brute force
The process of testing every possible combination of characters to determine an answer
Ciphertext
The result when cleartext/plaintext is run through a cipher algorithm using a key
Symmetric encryption
Any encryption implementation that uses the same key for encryption and decryption. Inherently weak since the key must be shared and can be lost. E.g., DES
Asymmetric encryption
Any encryption implementation that uses different keys for encryption and decryption (e.g., a public/shared key and a private/secret key)
Block cipher
Any cipher that encrypts data in discrete blocks/chunks (e.g., a cipher encrypting discrete IP packets). E.g., AES
Stream cipher
Any cipher that encrypts data on the fly. Common on wireless networks and mobile phone data networks. E.g., RC4
DES
Data encryption standard. Symmetric key algorithm and block cipher. Encrypts data using a 56-bit key, in 64-bit blocks. Very vulnerable due to the short key length. More modern variants: 3DES, IDEA, Blowfish
RC4
Rivest Cipher 4. Symmetric key algorithm and stream cipher. Today it is very vulnerable to attacks
AES
Advanced encryption standard. Block cipher. Encrypts data in 128-bit blocks. Can use a 128- 192-, or 256-bit key. Very fast. For now, virtually uncrackable. Very popular today, usually the only cipher that is recommended
Safest and most secure encryption algorithm today
AES. The longer the key, the better. 256-bits is the longest.
Inventors of asymmetric public key cryptography
Whitfield Diffie, Martin Hellman, Ralph Merkle
Common name for public key asymmetric key implementation
Diffie-Hellman Key Exchange
Private key
One of the two keys created in asymmetric encryption. Kept strictly secret; never revealed to anyone. Used only to decrypt data encrypted with the matching public key.
Public key
One of the two keys created in asymmetric encryption. Can be freely shared with anyone. Used to encrypt data that can only be decrypted with the matching private key.
Encryption at OSI Layer 1
None; no common encryption on the physical layer
Encryption at OSI Layer 2
Lots of encryption at the Data Link layer using proprietary devices
Encryption at OSI Layer 3
Only IPSec encryption occurs (currently) at the network layer
Encryption at OSI Layer 4
None; no common encryption at the transport layer
Encryption at OSI Layer 5
None; no common encryption at the session layer
Encryption at OSI Layer 6
None; no common encryption at the presentation layer
Encryption at OSI Layer 7
Common layer for encryption (e.g., SSL/TLS, etc.)
Hash
A one-way mathematical function run on data (regardless of its content or length) that creates a fixed length result called a checksum or a digest
Checksum
The output of a hash. Also called a digest.
MD5
Message-digest algorithm version 5. Common hashing algorithm.
SHA
Secure hash algorithm. Another common hashing algorithm. Two versions: SHA-1, SHA-2
CRAM-MD5
Challenge-Response Authentication Mechanism MD5. Used as a special form of server authentication, especially for SMTP servers
Digital signature
Created by the sender of data (typically email), usually by hashing the message with a private key. Allows the holder of the public key to verify the identity of its sender.
Certificate
Standardized digital signature that allows proof of nonrepudiation of data (i.e., that the sender of the data is who they claim to be, and that the data is what it is supposed to be). Also used to verify the exchange of public keys.