Domain 6: Cryptography (11%)

¡Supera tus tareas y exámenes ahora con Quizwiz!

Symmetric Algorithms

(B)lowfish, Twofish (R)C5 (Rivest Cipher) (A)dvanced Encryption Standard (AES) (I)nternational Data Encryption Algorithm (IDEA) (D)ata Encryption Standard (DES)

CA

...

Centralized Storage

...

Certificate Life Cycle

...

Decentralized Storage

...

Digital Certificate

...

GPG

...

HTTPS

...

Hierarchical model

...

IPSec

...

Key Escrow

...

Key History

...

Key Management & Storage

...

Key Protection & Storage

...

Key Recovery

...

M of N Control

...

PGP

...

PKI

...

Pull Model

...

Push Model

...

Recovery Agent

...

S/MIME

...

SSH

...

SSL

...

TLS

...

Third-Party (Single-Authority) Trust

...

Trust Models

...

Web of Trust

...

Algorithms

A complex mathematical formula that dictates how the encryption and decryption process takes place

Algorithm

A complex mathematical formula that dictates how the encryption and decryption process takes place. Strengthened with a secret key.

128 bits

A good minimum starting point for the size of a hash value.

One-Way Hash

A mathematical function that takes a variable-sized message and transforms it into a fixed-length value (hash value, or message digest). It's difficult to invert the procedure, and is never decrypted.

Steganography

A method of hiding data in another type of media that effectively conceals the existence of the data.

Steganography

A method of hiding data in another type of media that effectively conceals the existence of the data. Typically performed by hiding messages in graphic images such as bitmap (BMP) files or other types of media files such as digital music files. Also used for watermarks

Information Assurance

A method of protecting information and information systems by providing confidentiality, integrity, authentication, and nonrepudiation.

Keyspace

A specific range of values, usually measured in bits, that is created by the algorithm to contain keys. The strength of a key depends on it.

Cryptosystem

A system that provides encryption and decryption.

Hashing

A value used in encryption systems to create a "fingerprint" for message. This prevents the message from being manipulated on its way to its destination. Provides integrity

Centralized Storage:

Administration

AES

Advanced Encryption Standard: Created to replace DES. Standard using a symmetric block cipher supporting the key lengths of 128, 192, 256 bits

Digital Signature

An encrypted hash value used to ensure the identity and integrity of a message.

Confidentiality Authentication Nonrepudiation

Asymmetric schemes offer what information assurances?

Symmetric Keys

Both parties use the same key for encryption and decryption purposes. The sender uses the key to encrypt the message and then transmits it to the receiver. The receiver, who is in possession of the same key, uses it to decrypt the message

Transportation

Characters are rearranged through mathematical permutations

Confidentiality

Concept of ensuring data is not made available or disclosed to unauthorized people. Processes such as encryption must be used on the data, network infrastructure, and communication channels to protect against data interception and disclosure

Authentication

Concept of uniquely identifying individuals to provide assurance of an individual user's identity. It is the act of ensuring that a person is who he claims to be. Encrypted digital certificates are used to identify users electronically

CIA

Confidentiality, Integrity, Availability

Hash

Creates a "fingerprint" for a message.

DES/3DES

Data Encryption Standard: (Symmetric) Block cipher defined by the US government as an official standard. Most well-known and widely used cryptosystem in the world. Uses a 64-bit block size and a 56-bit key. 3DES: 168-bit encryption standard

SHA

Developed by the NSA to use with digital signature standards and is considered a more secure successor and alternative to MD5. AKA SHA-224, 256, 384, 512

DSA

Digital Signature Algorithm: Based on discrete logarithms and is used only for authentication. Secured secure when the key size is large enough. Originally proposed with a 512 bit key size and was eventually revised to support key sizes up to 1024 bits. Has a lack of key exchange capabilities, relatively slow, and has a public distrust of the public

ECC

Elliptic Curve Cryptosystems: Asymmetric: Used for encryption and digital signatures. Uses complex mathematical structures to create secure asymmetric algorithms and keys. Created for devices with smaller processing capabilities, such as cell phones, PDAs, and other wireless devices

Digital Signatures

Encrypted hash value used to ensure the identity and integrity of a message. Can be attached to a message to uniquely identify the sender. Guarantees the individual sending the message is who he claims to be

Symmetric

Encryption scheme in which both parties use the same key for encryption. Faster encryption because the underlying algorithms are more simple and efficient.

Asymmetric

Encryption scheme in which everyone uses different, but mathematically related, keys for encryption and decryption. Slower

One-Time Pad

Encryption scheme that, when implemented correctly, is considered secure and theoretically impossible to compromise. Pro: Secure because they're only used once. Con: Human error

Stream Cipher

Encrypts data one bit at a time

Stream Cipher

Encrypts data one bit at a time.

Block Cipher

Encrypts entire blocks of data

Block Cipher

Encrypts entire blocks of data. For many block ciphers, the block size is 64 bitz.

Quantum Cryptography

Extremely advanced, uses the quantum effect of light waves over fiber-optic cable to transmit code within theoretically unbreakable light pulses to distribute a shared key between two users

HMAC

Hash-based Message Authentication Code: Used as an algorithm for message authentication purposes where the authentication is applied using hash functions and a secret key to create an authentication code value. Used to authenticate a message and provide data integrity

Integrity

Hashing offers what information assurance?

Centralized Storage:

Integrity

IDEA

International Data Encryption Algorithm: Symmetric Block Cipher: Uses 64-bit blocks of data, with a key length o 128 bits. The data blocks are divided into 16 smaller sections, which are subjected to eight rounds of cryptographic computation. The speed of IDEA in software is similar to that of DES. IDEA is the cipher used in the popular encyrption program PGP

Key Escrow

Involves a third party that holds a special third key used to encrypt the private key.

Diffie-Helman

Isn't an actual encryption algorithm: it's a key agreement protocol that enables users to exchange encryption keys over an insecure medium. Depends on the discrete logarithmic formulas for its security. Used in PKI

MD4

Message Digest 4: One-way hash function that produces a 128-bit hash message digest value

MD5

Message Digest 5: A slower but more complex version of MD4. Popular and widely used for security applications and integrity checking

Information Assurance

Method of protecting information and information systems by providing confidentiality, integrity, authentication, and nonrepudication

Integrity

Protection of information from damage or deliberate manipulation during transit. A cryoptological function of hashing is often used to create signature files that indicate if the file has been tampered with if the hashed value does not match the original

RIPEMD

RACE Integrity Primitives Evaluation Message Digest: A hash function message digest. Reduces the chance of hash value collisions, slower and not as popular ain use a SHA-1 or MD5

RC4

Rivest Cipher: Symmetric Stream Cipher: Used in popular encryption protocols such as SSL, TLS, and also 40-bit and 128-bit WEP. Utilizes secure exchange of a shared key

RSA

Rivest, Shamir, and Adleman: Asymmetric Public Key: Main standard for encryption and digital signatures and is widely used for electronic devices, OS, and software applications. Used primarily for encryption and digital signatures

Centralized Storage:

Scalability

Centralized Storage:

Security

2 Main Types of Symmetric Encryption:

Stream & Block Cipher

2 Types of Cipher Encryption:

Substitution & Transportation

Twofish

Symmetric Block Cipher: Very similar to Blowfish but uses a block size of 128 bits and key sizes up to 256 bits. Twofish is a free public domain encryption cipher and is often used in open-source projects as an OpenPGP

Confidentiality

Symmetric systems can only offer what information assurance through encryption?

Blowfish

Symmetric: Uses 64-bit blocks of data. Its key length is 448 bits, and uses 16 rounds of cryptographic computations. Was designed specially for 32-bit machines and is significantly faster than DES

Substitution

Takes plain text and substitues the original characters in the data with other characters (Ex: ABC translates into XYZ)

Confidentiality

The concept of ensuring that data is not made available or disclosed to unauthorized people.

Authentication

The concept of uniquely identifying individuals to provide assuranc of an individual user's identity.

Cryptography

The conversion of communicated information into secret code that keeps the information confidential and private.

Nonrepudiation

The inability of a person to deny the origin of a signature or document, or the receipt of a message or document.

Public Key

The key known to all users

Private Key

The key which is given to the user remains secret.

Integrity

The protection of information from damage or deliberate manipulation.

The Receiver's Private Key

The receiver will decrypt a message or file with what key?

The Receiver's Public Key

The sender will encrypt a message or file with what key?

Encryption

The transformation of data into an undreadable form (ciphertext). The central function of cryptography.

Decryption

Transforms ciphertect into plain text.

Asymmetric Keys

Two keys are created for encryption and decryption purposes: One key is the public key, which is known to all users, while the private key remains secret and is given to the user to keep private. To use a system, a user encrypts with the intended receiver's public key. To decrypt, the receiver will use the private key that only he possesses

Transposition

Type of cipher encryption in which the characters are rearranged through mathematical permutations.

Substitution

Type of cipher encryption that takes plain text and substitues the original characters in the data with other characters.

Message Digest Hashing

Used for digital signature applications when a large message must be hashed in a secure manner

Nonrepudiation

Used to describe the inability of a person to deny or repudiate the origin of a signature or document

WPA/WPA2

Wi-Fi Protected Access: Most recent and secure form of encryption for wireless networks. Can use apre-shared key

WEP

Wireless Encryption Protocol: Security protocol that provides encrypted communication between wireless clients and access points. Uses a key encryption algorithm to encrypt communications between devices. Each client and access point on the wireless LAN must use the same encryption key. Key is manually configured on each access point and each client before either can access the network


Conjuntos de estudio relacionados

Ryan Keaton chapter 1 accounting ethics

View Set

Quiz 2- osmosis (definition & applications), tenacity, lipids, and carbohydrates

View Set

Intro to Psychology Module 19 - Accuracy and Inaccuracy

View Set

Health human growth and development vocab

View Set

BUAD 100 - University of Delaware

View Set