FCPS Security + Encryption Methods (UPDATED)
CBC
Cipher Block Chaining | first block is ran through an initialization vector before being encrypted. The next block is XORed with the block before it.
CAC
Common Access Card - smart card used by US Department of Defense
Cipher Feedback
Each bit produced in the keystream is the result of a predetermined number of fixed ciphertext bits - Authentication
WPA2
WiFi Protected Access 2 | utilizes AES as a modern form of encryption
WPA
WiFi Protected Access | encryption method to protect WiFi
WEP
Wired Equivalence Protocol. Wireless network encryption system.
Block Cypher
A block cipher is a method of encrypting text (to produce ciphertext) in which a cryptographic key and algorithm are applied to a block of dat
Output Feedback
A block cipher mode of operation that turns a block cipher into a synchronous stream cipher
Blowfish
A block cipher that operates on 64-bit blocks and can have a key length from 32 to 448 bits.
Diffie-Hellman
A cryptographic algorithm that allows two users to share a secret key securely over a public network.
PGP (Pretty Good Privacy)
A key-based encryption system for e-mail that uses a two-step verification process.
Public Key Encryption
A method of paired key encryption in which the key used to encrypt data is made available to anybody and its corresponding decryption key is kept secret.
Confusion
A process of making input seem unconnected to a key input in an encryption algorithm
TKIP (Temporal Key Integrity Protocol)
A security protocol created by the IEEE 802.11i task group to replace WEP.
encryption key
A set of characters that the originator of the data uses to encrypt the plaintext and the recipient of the data uses to decrypt the ciphertext.
Quantum Cryptography
A type of asymmetric cryptography that attempts to use the unusual and unique behavior of microscopic objects to enable users to securely develop and share keys.
private key encryption
A type of encryption where only the two parties involved in sending the message have the code.
AES
AES (acronym of Advanced Encryption Standard) is a symmetric encryption algorithm. The algorithm was developed by two Belgian cryptographer Joan Daemen and Vincent Rijmen
SHA-512
An implementation of SHA-2 using a 512-bit hash.
SRTP
Secure Real-Time Protocol
DAC
Discretionary Access Control - means of restricting access to objects based on the identity of the user or group to which they belong
AES
ES was designed to be efficient in both hardware and software, and supports a block length of 128 bits and key lengths of 128, 192, and 256 bits
Asymetric Encryption
Asymmetric Encryption is a form of Encryption where keys come in pairs. What one key encrypts, only the other can decrypt
Authentication in RSA
Can be used to authenticate or identify another person or entity since each entity has an associated private key that no one else has access to
CA
Certificate Authority
CRL
Certificate Revocation List
CTR
Counter | Has a ash value and a counter that increments each time a block is encrypted
DES
DES is a block cipher, and encrypts data in blocks of size of 64 bit each, ... The same algorithm and key are used for encryption and decryption
ECC Algorithm
Elliptic Curve Cryptography | a public key encryption technique based on an elliptic curve theory that can be used to create more efficient keys
GPG
GNU Privacy Guard | a different implementation of the open PGP standard
Honey encryption
Honey encryption is a type of data encryption that "produces a ciphertext, which, when decrypted with an incorrect key as guessed by the attacker, presents a plausible-looking yet incorrect plaintext password or encryption key
IKE
Internet Key Exchange - provides authenticated key management and authenticates involved peers with IPsec
Triple DES
Matches 3 DES keys, leading to an effective 168 bit key size | 3 iterations of rounds per block
MD-5
Message digest 5A. popular type of hash encoding algorithm.
NFC Attack
Near Field Communication Attack | eavesdropping and replay attack on NFC signals
OCSP
Online Certificate Status Protocol
OTA
Over The Air
SHA-2
The second revision of SHA, also designed by the NSA, which supports a variety of hash sizes, the most popular of which are SHA-256 and SHA-512.
Encryption
Process of converting readable data into unreadable characters to prevent unauthorized access.
SHA-1
Produces a 160-bit hash value and is used in DSS
RC 5
RC5 is a block cipher and addresses two word blocks at a time.
RSA Encryption
RSA (Rivest-Shamir-Adleman) is the most common internet encryption and authentication system. The system used an algorithm that involves multiplying two large prime numbers to generate a public key, used to encrypt data and decrypt an authentication, and a private key, used to decrypt the data and encrypt an authentication.
Asymmetric Algorithms
RSA, ECC, Diffie-Hellman, El Gamal, Knapsack, and DSA
RFID Attack
Radio Frequency Identifier Attack | a Denial of Service attack that jams the signal with noise interference
RADIUS
Remote Authentication Dial-In User Service - centralized wireless authentication system
RC4 Encryption
Stream cipher that encrypts bit by bit
Symmetric Encryption
Symmetric encryption is a type of encryption where only one key (a secret key) is used to both encrypt and decrypt electronic information
Streaming Cipher
Symmetric key cipher where plaintext digits are encrypted bit by bit
Fuzzing
Technique used to discover security loopholes in software or networks
A honey pot is used for what purpose?
To delay intruders in order to gather auditing data
TPM
Trusted Platform Module - chip on device that stores RSA encryption keys specific to the host system
Twofish
Twofish is a symmetric key block cipher with a block size of 128 bits and key sizes up to 256 bits
Block Cipher
a method of encryption that processes blocks of data rather than streams
Stenography Encryption
data hidden within data. Steganography is an encryption technique that can be used along with cryptography as an extra-secure method in which to protect data. Steganography techniques can be applied to images, a video file or an audio file
obfuscation
the action of making something obscure, unclear, or unintelligible