Video Content Lesson 3 Flashcards

2
Q

Julius Caesar’s Cryptography was known as

A

ROT3 (Rotate 3 characters)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Famous German Encryption Machine

A

Enigma

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Japanese Encryption Machine

A

Purple Machine

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Current Goals of Cryptography

A
Ensure Confidentiality (private messages stay private even during transmission)
Provide Integrity (ensure message hasn't been changed in transmission--digital signature does this)
Provide Authentication (Validates claimed identity of message's sender, uses encrypted challenge phrases to ensure other party knows appropriate key--similar to non-repudiation)
Provides Nonrepudiation (provides assurance that message came from who it says it came from, validates that message has not been spoofed)
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Cryptographic Uses

A

Email
Protocols and standards (PGP Pretty Good Privacy; S/MIME Secure/Multipurpose Internet Mail Extension; IPSec Internet connection security; SSL/TLS Secure Socket Layer/Transport Layer Security)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Concepts and Methodologies

A
Cryptography Terms
Tranposition Cipher
Subtitution Cipher
Cipher Categories
Cipher Process
Symmetric Algorithms
Asymmetric Algorithms
Message Authentication
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Cryptography Terms

A

plaintext-Original message- readable
Ciphertext-encrypted message- only readable if first decrypted
Cipher-process of rearranging or altering a plantext message so it is unreadable

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Tranposition Cipher

A

Start with a keyword
List the ordinal values, based on a letter’s position in the alphabet
Write plaintext message in tabular form
Read individual columns

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Substitution Cipher

A

replaces each character of a plaintext message
All that is needed is a table of plaintext characters and their associated substitute characters
A simple algorithm can be created
Both sender and receiver must use same
One-Time Pad (OTP) (only known unconditionally secure cipher)
Never reuse a OTP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Cipher Categories

A
Stream Cipher (each character is encrypted-example substitution cipher)
Block Cipher (works on a chunk/block of plaintext-example transposition cipher)
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Cipher Process

A

One-way function (function that is relatively easy to use to produce output values AND impossible (or nearly so) to deduce the input values from the output values)
Algorithm is sequence of steps used to encrypt plaintext
Key is some value used by the algorithm to encrypt plaintext

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Symmetric Algorithms

A

Secret Key Algorithm (same key used to encrypt and decrypt a message
Weaknesses (Key Distribution, lacking nonrepudiation, not scalable (to lots of people)
Main Strength (Fast)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Asymmetric Algorithms

A

Public Key Algorithm (public and private key)
Sender encrypts the message with the receiver’s public key
Receiver decrypts the message with his own private key
Strengths (user maintenance and key management is easy, supports nonrepudiation, key distribution is simple)
Weakness (Slow)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Message Authentication

A

Hashing (mathmatical process that produces a digest of a message (similar to checksums); when the message changes, the digest changes as well; extremely unlikely for two messages to produce the same digest
Hashing allows the receiver to verify authenticity of the message
Digital signatures are used to verify the authenticity of a message

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Cryptopraphic Algorithms

A
Binary math used in most cryptographic algorithms (AND, OR, XOR) (most typically used XOR)
DES
Triple DES
IDEA-Blowfish-Skipjack
AES
RSA-El Gamal
Hashing Algorithms
Other Hashing Algorithms
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

DES

A

Symetrical Coding
Data Encryption Standard (DES)
Published in 1977
Adopted by US government as a standard for all data communications
64-bit block cipher
Key is 56-bit key (remaining 8 bits are parity bits)
4 DES modes
1-Electronic Codebook (ECB) (each 64-bit plaintext block is encrypted with the key)
2-Cipher Block Chaining (CBC) (the XOR operator is used to combine each plaintext block and the preceeding block before encryption)
3-Cipher Feedback (CFB) (the XOR operator is used to combine each plaintext block and the preceeding block after encryption)
4-Output Feedback (OFB) (similart to CFB, but the plaintext is combined with a seed value using the XOR operator

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Triple DES

A
Double DES (2DES)--No stronger than DES
Triple DES (3DES)
More secure implementation of the DES algorithm
Exists in three versions (all versions are equally secure)
Ecryption algorithm is the same as DES
E(K1,E(K2,E(K3,P))) 168 bits
E(K1,E(K2,E(K1,P))) 112 bits
E(K1,D(K2,E(K1,P))) 112 bits
E-encryption algorithm
D-decryption algormithm
K1, K2, K3-encryption keys
P-plaintext
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

IDEA

A

IDEA - International Data Encryption Algorithm (stronger alternative to DES)
Works on 64-bit blocks
Key starts at 128-bits
Key is broken into 52 16-bit subkeys
Subkeys are used to encrypt the plaintext
Very secure (used in commercial business)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Blowfish

A

Developed by Bruce Schneider as an alternative to DES and IDEA
Operates on 64-bit blocks
Key can vary from 32 bits to 448 bits

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Skipjack

A

Block cipher operates on 64-bit blocks
Uses 80-bit key
Used in Clipper and Capstone high-speek encryption chips
Supports key escrow

22
Q

AES

A

Advanced Encryption Standard (AES) (Symetrical)
Based on Rijndael cipher
Allows three key strengths
128-bit key (requires 9 rounds of encryption)
192-bit key (requires 11 rounds of encryption)
256-bit key (requires 13 rounds of encryption)
Uses three transformation layers (Linear, nonlinear, key additional transform)

23
Q

RSA

A

Asymetrical have at least two key (public and private)
RSA created (1977) by (Ronald Rivest, Adi Shamire, and Leonard Adleman)
Most Popular
Depends on difficulty in factoring very large prime numbers

24
Q

El Gamal

A

1985 by Dr. T. El Gamal

Uses large integers and modular mathmetics to calculate keys

25
Q

Hashing Algorithms

A

a hash is taking a block of code and creating an output string of a block of code that represents a digest
SHA-1 (Secure Hash Algorithm)
developed by the National Institute of Standards and Technology (NIST)
Input any size
Always generates a 160-bit digest
MD2, MD4, and MD5 (Message Digest)
MD5 was developed by Ronald Rivest in 1991
Uses 4 computation rounds and produces a 12-bit digest

26
Q

Other Hashing Algorithms

A

Haval (univeristy of Wallongong, Australia variable length output 128, 160, 192, 224, or 256 bits AND variable number of rounds 3, 4, or 5)
RIPEMD-160 (European RACE Integrity Primitives Evaluation project with 160 bit output AND 5 paired rounds of 16 steps each)

27
Q

Cryptographic Practices

A
Digital Signatures
Signature Types
Key Distribution
Stenganography
PKI
28
Q

Digital Signatures

A

provides assurance that the message came from the stated sender AND did not change while in transit (Nonrepudiation and integrity)

29
Q

Signature Types

A

Hashed Message Authentication Code (HMAC) (Uses shared secret keys, so it does NOT provide nonrepudiation BUT it is more efficient thatn public key encryption schemes
Digital Signature Algorithm (DSA) (Asymmetric algorithm , Variable-length key size 512 and 1024 bits, works with SHA-1 digests
Digital Signature Standard (DSS) (Documentation or standatd set forth by NIST that sets standards for all government cryptography usage, Standard states that DSA is used for digital signatures and SHA-1 for hashing)

30
Q

Key Distribution

A

how distribute keys?
Manual (paper or electronic)
Public key encryption (once public key encryptions is set up, it can be used to exchange private keys)
Diffie-Hellman Exchange (Algorithm used to calculate and exchange values on both sides; uses large integers and modular arithmetic; Each side produces the same large integer which is used as a secret key)

31
Q

Stenganography

A

normal cryptography just encrypts a message
Hides the fact that the message exists
In normal use, the message is hidden inside another document
graphics files are common carriers
EX- every 16th bit could be changed without changing the actual image appearance

32
Q

PKI (Public Key Infrustructure)

A

Ansymetric keys most common to use
Digital certificate (a copy of a person’s public key that is endorsed by a trusted third party)
Certificate Authorities (CA) (neutral organizations that offer notarization services for digital certificates; the validity of the CA is the trust that users have in them)
If a digital certificate is received from an unknown CA, do not accept it)
Public keys are published as digital certificates
CAs handles the generation and distribution of keys
Trust in the CA provides assurance that the parties presenting the days are who they say they are

33
Q

System Architecture

A
PEM
MOSS
S-MIME
SSL
HTTPS
SET
IPSec
ISAKMP
34
Q

PEM

A

Privacy Enhanced Mail (PEM) (secure e-mail standard that uses CA-managed digital certificates)

35
Q

MOSS

A

MIME Object Security Services (MOSS) (suggested replacement for PEM that does NOT use CA digital certificates; provides associations between e-mail addresses and certificates; provides secure exchange of attached documents)

36
Q

S-MIME

A

Secure/Multipurpose Internet Mail Extensions (S/MIME) (e-mail encryption standard; Uses X.509 digital certificates to exchange keys; routinely uses both symmetric and asymmetric algorithms; very configurable; very flexible

37
Q

SSL

A

Secure Sockets Layer (SSL) (originally developed by Netscape to provide encrypted transfers between a Web client and a Web server; uses certificates; weakness as it provides encryption only to the web server which is usually outside the firewall; TLS should replace SSL)

38
Q

HTTPS

A

Secure Hypertext Transfer Protocol (SHTTP/HTTPS) Differs from SSL in that each message is encrypted instead of creating a secure channel; supports 2-way authentication

39
Q

SET

A

Secure Electronic Transactions (SET) by Visa and Mastercard

40
Q

IPSec

A

IP Security (IPSec) (complete infrastructure for secure network communications; 1-Transport mode - only the payload is encrypted (can be used with VPM); 2-Tunnel mode - entire packet is encrypted, including the header (gateway to gateway connection through a VPN)

41
Q

ISAKMP

A

Internet Security Association and Key Management Protocol (ISAKMP) (provides background services for IPSec; provides a method to maintain Security Associations of IPSec machines; provides key management)

42
Q

Methods of Attack

A
Brute Force
Known Plaintext
Chosen Ciphertext
Chosen Plaintext
Meet-in-the-Middle
Man-in-the-Middle
Birthday
Replay
43
Q

Brute Force

A

Exhaustively attempts every possible combination to try to break a key
Consumes substantial computing resources
always look at the safety and security of algorithms as computing power changes

44
Q

Known Plaintext

A

The attacker has a copy of the plaintext and ciphertext versions of the protected file; allows the attacker to analyze the relationship between the plaintext and the ciphertext

45
Q

Chosed Ciphertext

A

If the attacker can decrypt portions of the encrypted message; the decrypted message fragment can be analyzed to possibly discover the key

46
Q

Chosen Plaintext

A

attacker can encrypt palintext message; compare ciphertext with result of another encryption to possibly discover the key by matching the two

47
Q

Meet-in-the-Middle

A

MIM attacker uses two simultaneous brute force attacks; works for algorithms that use two rounds of encryption; attacker encrypts a known plaintext with every possible key while decrypting the associated ciphertext with every possible key
attack is successful when a match is found

48
Q

Man-in-the-Middle

A

MIM (usual MIM) attacker sits betweeen an intended sender and receiver
Intercepts session initiation and sets up a session from the sender to the attacker, and from the attacker to the receiver

49
Q

Birthday

A

based on probability
Also called the collision attack
attempts to find a different message that produces the same digest
If you have a room with at least 23 people there is a 50% chance that there are two people with the same birthday

50
Q

Replay

A

Attacker intercepts a session and records it
The session is played back later
different from the MIM in that MIM is active not passive
easily defeated by incorporating time stamps