WGU Course C839 - Intro to Cryptography

Lakukan tugas rumah & ujian kamu dengan baik sekarang menggunakan Quizwiz!

An authentication method that periodically re-authenticates the client by establishing a hash that is then resent from the client is called ______. A PAP B CHAP C SPAP D EAP

B

Microsoft provides a system for encrypting partitions or entire hard drives using a Trusted Platform Module (TPM). By default, it uses the AES encryption algorithm with a 128-bit key.

Bitlocker

A 16-round Feistel cipher working on 64-bit blocks. Unlike DES, it can have varying key sizes ranging from 32 bits to 448 bits. Designed by Bruce Schneier.

Blowfish

What is contained in a CRL? A Keys for RSA B New certificates C Revoked certificates D Keys for AES

C

What size block does FORK256 use? A 256 B 128 C 512 D 64

C

Which of the following equations is related to EC? A P = Cd%n B Me%n C y2 = x3 + Ax + B D Let m = (p-1)(q-1)

C

Which of the following is generally true about block ciphers? A Secret block ciphers should be trusted. B Block ciphers permute the bits of the input plaintext. C The plaintext and ciphertext are always the same size. D A block cipher is an encryption function for variable-size blocks of data.

C

A known-plaintext attack is more powerful than a ciphertext-only attack. A True B False

A

AH is the authenticating protocol, and ESP is an authenticating and encrypting protocol that uses cryptographic mechanisms to provide source authentication, confidentiality, and message integrity.

Authentication Header (AH) and Encapsulating Security Payload (ESP).

A server that authorizes the principal and connects them to the ticket granting server.

Authentication Server (AS)

A small change that yields large effects in the output.

Avalanche

This term means that a small change yields large effects in the output, like an avalanche. This is Fiestel's variation on Claude Shannon's concept of diffusion. We will see Fiestel's ideas used in many of the block ciphers we explore in this module.

Avalanche

Cryptanalysis attack where the attacker is assumed to have access only to a set of ciphertexts.

Ciphertext-only attack

individuals, and intended for email

Class 1 Certificates

organizations for which proof of identity is required

Class 2 Certificates

Not certified for government use

Class 4 algorithms

Online business transactions between companies

Class 4 certificates

A number that has no factors in common with another number (3 & 7)

Co-prime numbers

______________ is a measure of how many things interact at any one point. If the effect of an option is limited to a small part of the program, then it cannot interact with an option whose effect is limited to another part of the program.

Complexity

Attempts to make the relationship between the statistical frequencies of the ciphertext and the actual key as complex as possible by using a complex substitution algorithm.

Confusion

Attempts to make the statistical frequencies of the ciphertext and actual key as complex as possible

Confusion

In terms of cryptanalysis, what does it mean to break a cipher? A finding a method to decrypt a message that is at least twice as efficient as brute force B trying every possible key until you can decrypt the message C deploying an algorithm that uses a 228 bit key D finding any method to decrypt the message that is more efficient than brute force

D

What type of encryption uses different keys to encrypt and decrypt the message? A Symmetric B Private key C Secure D Asymmetric

D

A number that is used only one time then discarded is called what?

Nonce

Carries out real-time validation of a certificate and reports back to the user whether the certificate is valid, invalid, or unknown. OCSP checks the CRL that is maintained by the CA.

Online Certificate Status Protocol (OCSP)

Which of the following modes can be used to turn a block cipher into a stream cipher?

Output feedback (OFB) and Counter Mode (CTR)

Type of tunneling mechanism that provides terminal-like access to remote computers. Provides authentication and secure transmission over vulnerable channels like the Internet.

Secure Shell (SSH)

Uses public key encryption and provides data encryption, server authentication, message integrity, and optional client authentication. It is currently at version 3.0.

Secure Sockets Layer (SSL)

Like AES, Serpent has a block size of 128 bits and can have a key size of 128, 192, or 256 bits. The algorithm is also a substitution-permutation network like AES. It uses 32 rounds working with a block of four 32-bit words. Each round applies one of eight 4-bit to 4-bit S-boxes 32 times in parallel. Designed by Ross Anderson, Eli Biham, and Lars Knudsen.

Serpent

The Feistel Network DES 3DES AES Blowfish Serpent Twofish Skipjack IDEA CAST TEA SHARK

Symmetric Block Cipher Algorithms

Time - The number of "primitive operations" which must be performed. This is quite loose; primitive operations could be basic computer instructions, such as addition, XOR, shift, and so forth, or entire encryption methods. Memory - The amount of storage required to perform the attack. Data - The quantity of plaintexts and ciphertexts required.

The 3 resources for cryptanalysis

The time and effort required to break a protective measure.

Work factor

The public-key algorithms are used to establish _________, which in turn is used to encrypt the actual data. This combines the flexibility of public-key cryptography with the efficiency of symmetric-key cryptography.

a secret key

The most basic encryption mode is the _________________. The message is divided into blocks and each block is encrypted separately.

electronic codebook (ECB) mode

The simplest method to encrypt a longer plaintext is known as the _______________________. It has serious weakness, therefore, do not use this method.

electronic codebook mode (ECB)

In information theory,__________ is a measure of the uncertainty associated with a random variable.

entropy

An __________________ attack is one that tries all possible values for some target object, like the key. If an attack requires 2^235 steps of work, then this corresponds to an exhaustive search for a 235-bit value.

exhaustive search

In World War II, the Germans used this as an electromechanical rotor-based cipher system. The machine was designed so that when the operator pressed a key, the encrypted ciphertext for that plaintext was altered each time. So, if the operator pressed the A key, he or she might generate an F in the ciphertext, and the next time, it might be a D. Essentially, this was a multi-alphabet cipher consisting of 26 possible alphabets.

The Enigma Machine

This function is named after its inventor, the German-born physicist and cryptographer Horst Feistel. At the heart of many block ciphers is a Feistel function. So this makes it a good place to start with study of symmetric algorithms. This function forms the basis for many, if not most, block ciphers. This function starts by splitting the block of plaintext data (often 64 bits) into two parts (traditionally termed L0 and R0). Usually, the split is equal, and both sides are the same size.

The Feistel Function

A ________________ is one in which you know both the plaintext and the ciphertext. The most obvious goal is to find the decryption key.

known-plaintext attack

Homophonic substitution was one of the earlier attempts to make substitution ciphers more robust by_________ the letter frequencies.

masking

Digital signatures are the public-key equivalent of ______________________.

message authentication codes

The _____________ mode turns a block cipher into a synchronous stream cipher. It generates keystream blocks, which are then XORed with the plaintext blocks to get the ciphertext.

output feedback (OFB)

The original message, m is called the ______________.

plaintext

In PKI, Bob encrypts the message with Alice's _______________ and sends it. When Alice receives the message, they can decrypt it with her ________________.

public key; private key

First introduced by Eli Biham in 1993, a ___________ attack assumes that the attacker has access to several encryption functions. These functions all have an unknown key, but their keys have a relationship that the attacker knows.

related-key

To encrypt with a block cipher, we need a ___________.

secret key

The most widely used asymmetric encryption algorithm is what? A RSA B Vigenere C DES D Caesar Cipher

A

Announced by NIST as FIPS 197. Has 3 key sizes: 128, 192, 256 and all operate on 128 bit block

AES

Original, unencrypted information is referred to as ____. A text B plaintext C cleantext D ciphertext

B

The greatest weakness with symmetric algorithms is _____. A They are less secure than asymmetric B The problem of key exchange C They are slower than asymmetric D The problem of generating keys

B

____ was designed to provide built in cryptography for the clipper chip. A Blowfish B Skipjack C GOST D 3DES

B

_____ uses at least two different shifts, changing the shift with different letters in the plain text. A Atbash B multi-alphabet encryption C Scytale D Caesar cipher

B

A ______ refers to a situation where two different inputs yield the same output. A Substitution B Convergence C Collision D Transposition

C

A process that puts a message into the least significant bits of a binary file is called what? A Symmetric cryptography B Masking C Steganography D Asymmetric cryptography

C

Which of the following uses an 80 bit key on 64 bit blocks? A Twofish B AES C Skipjack D DES

C

Symmetric algorithm encryption

C = E(k,p)

Cipher text (C) is equal to the encryption function (E) with the key (k) and plain-text (p) being passed as parameters to that function

C = E(k,p) Symmetric encryption

_________ allows you to enter in any text, choose the historic algorithm you wish to use, then encrypt that text in a matter of seconds.

CrypTool

Which of the following is NOT an asymmetric system? A PGP B RSA C SSL D DES

D

Naor-Reingold, Mersenne Twister, Linear Congruential Generator, Lehmer Random Number Generator (twisted generalized feedback shift registers), Lagged Fibonacci Generator (LFG)

Examples of PRNGs (pseudo random number generators)

Symmetric algorithm decryption

P = D(k,c)

________________ was created by David Wheeler and Roger Needham and first publicly presented in 1994. It is a simple algorithm, easy to implement in code. It is a Feistel cipher that uses 64 rounds (note this is a suggestion, it can be implemented with fewer or more rounds). The rounds should be even since they are implemented in pairs called, cycles. it uses a 128-bit key operating on a 64-bit block. It also uses a constant that is defined as 232/the golden ratio.

TEA, or Tiny Encryption Algorithm

Ticket granting service

TGS

Designed by Ross Anderson and Eli Biham in 1995. The size of a ________ hash value is 192 bits.

TIGER

Used to authenticate to the server. Contains the identity of the client, the session key, the timestamp, and the checksum. It is encrypted with the server's key.

Ticket

Provides tickets

Ticket Granting Server (TGS)

Symmetric cipher that applies DES three times to each block of data during the encryption process.

Triple DES (3DES)

An encryption function for fixed-size blocks of data. The current generation has a block size of 128 bits (16 bytes).

block cipher

A _____________ is a number that has no factors in common with another number.

co-prime

An _____________ cipher implements an independently chosen random even permutation for each of the key values.

ideal block

An attack on a block cipher is a non-generic method of distinguishing the block cipher from an ______________ cipher.

ideal block

Stream ciphers are also sometimes called ________ ciphers.

state

64 bit algorithm operating at 56 bits with an 8 bit parity block

DES

One of the oldest of the modern symmetric ciphers is________. It was a block cipher developed by IBM in the early 1970s and used as a U.S. government standard until the 1990s. IBM had originally developed a cipher called Lucifer, which was designed by Horst Feistel. When the U.S. government began seeking a standardized encryption algorithm, IBM worked with the National Security Agency (NSA) to alter Lucifer to fit the government's needs, thus it was created. As you may guess, it is a Feistel cipher.

DES

This is a variation of DES that XORs another 64-bit key to the plaintext before applying the DES algorithm. The concept of simply XORing in an additional key is called whitening. This adds to the confusion of the resultant text.

DESx

A form of cryptanalysis applicable to symmetric key algorithms that was invented by Eli Biham and Adi Shamir. The examination of differences in an input and how that affects the resultant difference in the output.

Differential cryptanalysis

Developed and published by Whitfield Diffieand Martin Hellman in 1976, ______________ is a cryptographic protocol that allows two parties to establish a shared key over an insecure channel. It was the first publically described asymmetric algorithm and is often used for the key exchange of symmetric keys.

Diffie-Hellman

Changes to one character in the plain text affect multiple characters in the ciphertext, unlike in historical algorithms (Caesar cipher, ATBASH, Vigenère) where each plain text character only affects one ciphertext character.

Diffusion

Transposition processes used in encryption functions to increase randomness.

Diffusion

FIPS 186 covers what?

Digital Signatures

EFS is encryption for files while Bitlocker is used for full disk encryption

EFS vs. Bitlocker

This method of Audio Steganography (Steganophony) adds an extra sound to an echo inside an audio file, that extra sound conceals information.

Echo hiding

Asymmetric encryption method developed in 1984. It is used in PGP implementations and GNU Privacy Guard Software. Consists of 3 parts: key generator, encryption algorithm, and decryption algorithm.

El Gamal

This algorithm is based on Diffie-Hellman and was invented in 1984 by Taher Elgamal. It is used in some PGP implementations as well as GNU Privacy Guard software. The algorithm consists of three parts: the key generator, the encryption algorithm, and the decryption algorithm.

Elgamal

This algorithm was first described in 1985 by Victor Miller (IBM) and Neil Koblitz (University of Washington). It is based on equations of the form: y2 = x3 + Ax + B

Elliptic Curve Cryptography

The total number of co prime numbers for a number n

Euler's Totient

The number of positive integers less than or equal to n that are co-prime to n is called the _____________ of n. So for the number 6, 4 and 5 are co-prime with 6. Therefore, ______________ = 2.

Euler's totient

N denotes natural numbers. These are also sometimes called the counting numbers. They are 1, 2, 3, etc. Z denotes the integers. These are whole numbers such as -1, 0, 1, 2, etc. Basically, this set is the natural numbers combined with zero and the negative numbers. Q denotes rational numbers (or the ratios of integers). They are any number that can be expressed as a ratio of two integers. Examples are 3/2, 17/4, and 1/5. R denotes real numbers. This includes the rational number as well as numbers that cannot be expressed as a ratio of two integers, such as 2/3. i denotes imaginary numbers. These are numbers whose square is a negative. For example, √-1 = 1i.

Explain the number groupings: N, Z, Q, R, i

Published by Siemens in 1993. A software-based stream cipher using a Lagged Fibonacci generator (pseudorandom number generator).

FISH

Fn = 2^(2n) + 1 So, F1 = 221 + 1 or 5 However, F5 is not prime

Fermat Numbers

developed as a Russian national standard and produced fixed length outputs of 256 bits

GOST

FIPS 201 covers what?

Identity Verification

The attacker gains some Shannon information about plaintexts (or ciphertexts) not previously known.

Information deduction

Values that are used with algorithms to increase randomness for cryptographic functions.

Initialization vectors (IVs)

The attacker discovers additional plaintexts (or ciphertexts) not previously known.

Instance (local) deduction

Block symmetric cipher that uses a 128-bit key and 64-bit block size.

International Data Encryption Algorithm (IDEA)

A combination of the ISAKMP and OAKLEY protocols.

Internet Key Exchange (IKE)

A variation on frequency analysis that is used to attack polyaplhabetic substitution ciphers.

Kasiski test

____________is used widely, particularly with Microsoft operating systems. It was invented at MIT and derives its name from the mythical three-headed dog that was reputed to guard the gates of Hades. The client authenticates to the authentication server once using a long-term shared secret (e.g. a password) and receives a ticket-granting server from the authentication server. The tickets are time-stamped. This allows you to make additional requests using the same ticket within a certain time period (typically, eight hours). Uses symmetric cryptography Authentication is UDP port 88

Kerberos

The random bits used in encrypting a message.

Key

Different encryption keys generate the same ciphertext from the same plaintext message.

Key clustering

Cryptanalysis attack where the attacker is assumed to have access to sets of corresponding plaintext and ciphertext.

Known plaintext attack

A __________________, uses a block cipher in CBC mode to improve integrity.

MAC or Message Authentication Code

Improvement on FISH due to vulnerability to known-plaintext attacks. Published by Ross Anderson.

PIKE

Designed by Phil Zimmerman as a freeware e-mail security program and was released in 1991. It was the first widespread public key encryption program.

Pretty Good Privacy (PGP)

A 160 bit hash with 3 other versions: RIPEMD-128 (128 bit), RIPEMD-256 (256 bit), RIPEMD-320 (320 bit)

RIPEMD-160

In 1980, Martin Hellman described a cryptanalytic time-memory trade-off which reduces the time of cryptanalysis by using pre-calculated data stored in memory. Essentially, these types of password crackers are working with pre-calculated hashes of all passwords available within a certain character space, be that a-z, or a-zA-z, or a-zA-Z0-9, etc. These files are called ___________________. They are particularly useful when trying to crack hashes. Since a hash is a one-way function, the way to break it is to attempt to find a match. The attacker takes the hashed value and searches the rainbow tables seeking a match to the hash. If one is found, then the original text for the hash is found. A popular hacking tool is Ophcrack.

Rainbow Tables

The __________________ is similar to the chosen-plaintext attack, except the attacker can obtain ciphertexts encrypted under two different keys. (the keys need to be related, meaning that one was derived from the other as is the case in wireless systems)

Related-key attack

Valid data transmission is maliciously or fraudulently repeated to allow an entity gain unauthorized access.

Replay Attack

Block symmetric cipher that was chosen to fulfill the Advanced Encryption Standard. It uses a 128-bit block size and various key lengths (128, 192, 256).

Rijndael

In the SubBytes step, each byte in the matrix is substituted for another byte using an 8-bit substitution box, called the _____________.

Rijndael S-box

What is the difference between Secure HTTP (SHTTP) and HTTP Secure (HTTPS)?

S-HTTP is a technology that protects each message sent between two computers, while HTTPS protects the communication channel between two computers, messages and all.

Windows stores passwords as a hash in a file called a _____ file. As you should know by now, a hash cannot be un-hashed. However, as you have seen, Rainbow Tables can be used to look up the matching password.

SAM

A protocol for online shopping with a credit card. One of its features is that it encrypts the credit card number so that an eavesdropper cannot copy it.

SET

160 bit hash

SHA-1

256 bit and 512 bit hash

SHA-2

A cryptographic protocol and infrastructure developed to send encrypted credit card numbers over the Internet.

Secure Electronic Transaction (SET)

What did WPA replace RC4 with?

TKIP (Temporal Key Integrity Protocol)

Table look-up Hardware Algorithmic (software)

The 3 Types of Generators

The attacker deduces the secret key.

Total break

The payload and the routing and header information are protected in this mode.

Tunnel mode

Uses a block size of 128 bits and key sizes up to 256 bits. It is a Feistel cipher. Designed by Bruce Schneier, John Kelsey, Doug Whiting, David Wagner, Chris Hall, and Niels Ferguson.

Twofish

_________ uses a block size of 128 bits and key sizes up to 256 bits. It is a Feistel cipher. It was designed by Bruce Schneier, John Kelsey, Doug Whiting, David Wagner, Chris Hall, and Niels Ferguson.

Twofish

Most symmetric ciphers use_________ as part of their process

XORing

Don't ever trust a ____________ or ________________. (Kerckhoffs's Principle)

secret block cipher; secret algorithm

A _________ is a digital representation of information that identifies you as a relevant entity by a trusted third party? A Digital Signature B Hash C Ownership stamp D Digest

A

DES uses keys of what size? A 56 bits B 192 bits C 128 bits D 64 bits

A

Which of the following is NOT a key size used by AES? A 512 bits B 128 bits C 192 bits D 256 bits

A

Which of the following was a multi alphabet cipher widely used from the 16th century (1553) to the early 20th century (1900s)? A Vigenere B Caesar C Atbash D Scytale

A

With _____, the message is divided into blocks and each block is encrypted separately. This is the most basic mode for symmetric encryption. A Electronic codebook (ECB) B Cipher-block chaining (CBC) C Cipher feedback (CFB) D Output feedback (OFB)

A

FIPS 197 covers what?

AES

Cryptanalysis attack that exploits vulnerabilities within the algorithm structure.

Analytic attack

A _____ is a function that takes a variable-size input m and returns a fixed-size string. A Symmetric cipher B Hash C Asymmetric cipher D Feistel

B

This process is done by having each block of plaintext is XORed with the previous ciphertext block before being encrypted. A Output feedback (OFB) B Cipher-block chaining (CBC) C Electronic codebook (ECB) D Cipher feedback (CFB)

B

What is a salt? A Key rotation B Random bits intermixed with a hash to increase randomness and reduce collisions. C Random bits intermixed with a symmetric cipher to increase randomness and make it more secure. D Key whitening

B

Which of the following is a fundamental principle of cryptography that holds that the algorithm can be publically disclosed without damaging security? A Babbage's principle B Kerkchoff's principle C Vigenere's principle D Shamir's principle

B

Which of the following is an example of an unbalanced Feistel? A 3DES B Skipjack C Twofish D AES

B

The idea of the __________________ is to attempt to find a collision for a given hash. Now assume the hash is MD5, with a 128-bit output. You would have to try 2^128 possible hashes to guarantee a collision. That is a very large number. In decimal notation that is 3.4028236692093846346337460743177e+38 Now from the birthday paradox we know that we actually need about 1.174√2^128 or 21656477542535013597.184.

Birthday Attack

With just 23 people in the room, you have a 50 percent chance that 2 will have the same birthday.

Birthday Paradox

Cryptographic attack that exploits the mathematics behind the birthday problem in the probability theory forces collisions within hashing functions.

Birthday attack

In order for User A to send User B an encrypted message that only User B can read, User A must encrypt message with which of the following keys? A User A's public key B User A's private key C User B's public key D User B's private key

C

The process wherein the ciphertext block is encrypted then the ciphertext produced is XOR'd back with the plaintext to produce the current ciphertext block is called what? A Output feedback (OFB) B Cipher-block chaining (CBC) C Cipher feedback (CFB) D Electronic codebook (ECB)

C

This algorithm was published by the German engineering firm Seimans in 1993. It is a software based stream cipher using Lagged Fibonacci generator along with a concept borrowed from the shrinking generator ciphers. A RC4 B Blowfish C FISH D Twofish

C

This is a method for turning a block cipher into a stream cipher by generating a keystream block, which are then XORed with the plaintext blocks to get the ciphertext. A Cipher feedback (CFB) B Electronic codebook (ECB) C Output feedback (OFB) D Cipher-block chaining (CBC)

C

What is the formula (M^e)(%n) related to? A Encrypting with EC B Generating Mersenne primes C Decrypting with RSA D Encrypting with RSA

C

A ___________________ is an entity trusted by one or more users to manage certificates

CA (Certification Authority)

Component of a PKI that creates and maintains digital certificates throughout their life cycles.

Certificate Authority

____________________________ calculates a hash after the user has logged in, then it shares that hash with the client system. Periodically, the server will ask the client to provide that hash (this is the challenge part). If the client cannot, then it is clear that the communications have been compromised.

Challenge HandShake Authentication Protocol (CHAP)

Many experts believe that modern cryptography begins with _____________________ In 1949 he published a paper in the in the Bell System Technical Journal entitled Communication Theory of Secrecy Systems Shortly thereafter he and Warren Weaver published a book entitled Mathematical Theory of Communication

Claude Shannon

Numbers that have no factors in common with another.

Co-prime numbers

_______________ is the worst enemy of security, and it almost always comes in the form of features or options.

Complexity

FIPS 140 covers what?

Cryptographic Modules

If you use substitution alone, what weakness is present in the resulting cipher text? A It is the same length as the original text B It is easily broken with modern computers. C It is too simple. D Because it maintains letter and word frequency.

D

RFC 1321 describes what hash? A RIPEMD B SHA1 C GOST D MD5

D

Shifting each letter in the alphabet a fixed number of spaces to the right or left is an example of what? A Bit shifting B Confusion C Multi substitution D Single substitution

D

U.S. Patent 5,231,668 and FIPS 186 define what algorithm? A AES B RSA C Elliptic Curve (EC) D Digital Signature Algorithm (DSA)

D

What does the OCSP protocol provide? A encryption B VPN connectivity C hashing D a real time protocol for verifying certificates

D

What is Kerchoff's principle? A A minimum key size of 256 bits is necessary for security. B Both algorithm and key should be kept secret. C A minimum of 15 rounds is needed for a Feistel cipher to be secure. D Only the key needs to be secret, not the actual algorithm.

D

Which of the following is a cryptographic protocol that allows two parties to establish a shared key over an insecure channel? A Elliptic Curve B RSA C MD5 D Diffie-Hellman

D

Which of the following is a substitution cipher used by ancient Hebrew scholars? A Caesar B Vigenere C Scytale D Atbash

D

Most modern block ciphers have a ________ block size, but they operate on 32-bit words.

128-bit

A fixed-size pseudorandom number that is fed into a symmetric cipher to increase randomness is called what? A IV B Key C Chain D Salt

A

A number that is used only one time then discarded is called what? A Nonce B Chain C Salt D IV

A

If you wished to see a list of revoked certificates from a CA, where would you look? A CRL B CA C RFC D RA

A

In 1977 researchers at MIT described what asymmetric algorithm? A RSA B AES C DH D EC

A

Larger block sizes increase security. Larger key sizes increase security. If the round function is secure, then more rounds increase security. A True B False

A

The NSA classifies Suite A cryptographies as published, while Suite B as not published. NSA Suite A cryptography contains classified algorithms that will not be released. These algorithms are used to encrypt especially sensitive information. Suite B are publically described algorithms. A True B False

A

What does the Online Certificate Status Protocol (OCSP) provide? A Revoked certificates B Hashing C VPN connectivity D Encryption

A

What is a TGS? A The server that grants Kerberos tickets B protocol for encryption C protocol for key exchange D The server that escrows keys

A

What is the standard used by most digital certificates? A X.509 B CRL C RFC 2298 D OCSP

A

Which of the following is NOT required for a hash? A Minimum key length of 256 bits B Variable-length input, fixed-length output C Non-reversible D Few collisions

A

Which of the following is a stream cipher that uses variable length key from 1 to 256 bytes? A RC4 B AES C DESx D DES

A

Which of the following most accurately defines encryption? A changing a message so it can only be easily read by the intended recipient B Making binary changes to a message to conceal it C changing a message using complex mathematics D Applying keys to plain text

A

U.S. encryption standard that replaced DES. Block symmetric cipher that uses 128-bit block sizes and various key lengths (128, 192, 256).

AES

_________ is designated as FIPS 197 and can have three different key sizes. They are: 128, 192, or 256 bits. This algorithm was developed by two Belgian cryptographers, Joan Daemen and Vincent Rijmen. Unlike both DES and 3DES, it is not based on a Feistel network. This algorithm uses a substitution-permutation matrix rather than a Feistel network. It also operates on a four-by-four column-major order matrix of bytes, called the state.

AES

To perform the binary _____ operation, you take two binary numbers and compare them one place at a time. If both numbers have a one in both places, then the resultant number is a one. If not, then the resultant number is a zero.

AND

Cryptanalysis attack that exploits vulnerabilities within the intrinsic algebraic structure of mathematical functions.

Algebraic attack

The mathematical process used to alter a message and read it unintelligible by any but the intended party.

Algorithm

it should be impossible for any attacker to calculate, or otherwise guess, from any given subsequence, any previous or future values in the sequence

BSI Criteria K3 states

It should be impossible for any attacker to calculate, or guess from an inner state of the generator, any previous numbers in the sequence or any previous inner generator states

BSI criteria K4 states:

A ____________________is an attack that depends on the fact that duplicate values, also called collisions, appear much faster than you would expect.

Birthday attack

__________ is a symmetric block cipher that was designed in 1993 by Bruce Schneier. This cryptography algorithm is intended as a replacement for DES. Like DES, it is a 16-round Feistel cipher working on 64-bit blocks. However, unlike DES, it can have varying key sizes ranging from 32 bits to 448 bits. There are really two parts to this algorithm. The first part handles the expansion of the key. The second part actually encrypts the data. The key expansion is handled in several steps. The first step is to break the original key into a set of subkeys. Specifically, a key of no more than 448 bits is separated into 4,168 bytes. There is a P-array and four 32-bit S-boxes. The P-array contains 18 32-bit subkeys, while each S-box contains 256 entries.

Blowfish

A _________________ is a set of rules that defines how a certificate may be used.

CP (Certificate Policy)

In a ____________________, the attacker obtains the ciphertexts corresponding to a set of plaintexts. This can allow the attacker to attempt to derive the key used and thus decrypt other messages encrypted with that key.

Chosen plaintext attack

The algorithm(s) needed to encrypt and decrypt a message.

Cipher

A ____________________ is less effective, but much more likely for the attacker since the attacker only has access to a collection of ciphertexts. NOTE: The attacker ONLY has access to the ciphertext of messages.

Ciphertext-only attack

Juniper (block cipher) MAYFLY (asymmetric) FASTHASH (hashing) WALBURN (high bandwith link encryption) PEGASUS (satellite telemetry)

Class 1 Algorithms

Skipjack, Key Exchange Algorithm (KEA)

Class 2 Algorithms

DES, 3DES, SHA, AES (some AES implementations are Type I)

Class 3 Algorithms

servers and software signing, for which independent verification and checking of identity and authority is done by issuing CA

Class 3 Certificates

Private organizations or governmental security

Class 5 Certificates

__________________) is also used to turn a block cipher into a stream cipher. This is much like OFB mode. CTR generates the next keystream block by encrypting successive values of a "counter." The counter can be any simple function that produces a sequence that is guaranteed not to repeat for a long time.

Counter mode (CTR

What is X.509? A The standard for PGP certificates B The standard for encrypting email C The standard for FIPS 186 D The standard for digital certificates

D

Which of the following is generally true about block sizes? A Smaller block sizes increase security B Block sizes must be more than 256 bits to be secure C Block size is irrelevant to security D Larger block sizes increase security

D

Which of the following modes can be used to turn a block cipher into a stream cipher? A Propagating cipher-block chaining (PCBC) and Electronic codebook (ECB) B Counter Mode (CTR) and Propagating cipher-block chaining (PCBC) C Electronic codebook (ECB) and Output feedback (OFB) D Output feedback (OFB) and Counter Mode (CTR)

D

This is a variation of DES that simply XORs another 64-bit key to the plaintext before applying the DES algorithm.

DESx

Block symmetric algorithm chosen by NIST as an encryption standard in 1976. It uses a 56-bit true key bit size, 64-bit block size, and 16 rounds of computation.

Data Encryption Standard (DES)

__________________ is a form of cryptanalysis applicable to symmetric key algorithms and was invented by Eli Biham and Adi Shamir. Essentially, it is the examination of differences in an input and how that affects the resultant difference in the output. It originally worked only with chosen plaintext. It could also work with known plaintext and ciphertext.

Differential cryptanalysis

Provide authentication of a sender and integrity of a sender's message. A message is input into a hash function. Then the hash value is encrypted using the private key of the sender. The result of these two steps yields a __________________.

Digital Signature

The attacker can distinguish the cipher from a random permutation.

Distinguishing algorithm

Which encryption standard is used primarily for mobile devices?

ECC

Public key algorithm that can be used for digital signatures, encryption, and key exchange. an extension of the Diffie-Hellman algorithm.

El Gamal

What is the formula Me%n related to?

Encrypting with RSA

A measure of the uncertainty associated with a random variable

Entropy

Caesar Cipher - Every letter is shifted a fixed number of spaces to the left or the right in the alphabet. The reason it is easy to crack is the issue of letter and word frequency. Atbash Cipher - is a Hebrew code, easier to crack than Caesar, which substitutes the first letter of the alphabet for the last and the second letter for the second to the last, etc. It simply reverses the alphabet Used by Hebrew scribes copying the book of Jeremiah. Example: A becomes Z, B becomes Y, C becomes X, etc. Affine Cipher - is any single-substitution alphabet cipher (also called mono-alphabet substitution) in which each letter in the alphabet is mapped to some numeric value, permuted with some relatively simple mathematical function, and then converted back to a letter. The formula for Affine is: ax + b (mod M). M=26, x=Plaintext numerical equivalent, b=the shift, a=some multiple. For Caesar a=1. Rot13 Cipher - is another single alphabet substitution cipher. It is, in fact, the simplest of all of them. It is really just a permutation of the Caesar cipher. All characters are rotated 13 characters through the alphabet.

Examples of Mono-Alphabet Substitution

Cipher Disk - The cipher disk, like Scytale, is a physical device used to encrypt. The cipher disk was invented by Leon Alberti in 1466. The cipher disk was polyalphabetic; each time you turned the disk, you used a new cipher. It was literally a disk you turned to encrypt plaintext. Vigenère Cipher - is perhaps the most widely known multi-alphabet substitution cipher. At one time, multi-alphabet substitution was considered quite secure. In fact, the Vigenère cipher was used in the 1800s and early 1900s. The Vigenère cipher was invented in 1553 by Giovan Battista Bellaso. It is a method of encrypting alphabetic text by using a series of different Caesar ciphers based on the letters of a keyword. This is a very effective multi-alphabet cipher and prior to the advent of computers was considered quite strong. It should be noted that the longer the keyword, the more alphabets used to encrypt the message, and thus the stronger the encryption. In fact, one does not even need to use a real word. Any series of letters will work. In 1863, Friedrich Kasiski was the first person to publish a successful general attack on the Vigenère cipher. Playfair Cipher - invented in 1854 by Charles Wheatstone. It was named after Lord Playfair who promoted the use of the cipher. uses a five-by-five table containing a keyword or key phrase. To generate the key table, one would first fill in the spaces in the table with the letters of the keyword (dropping any duplicate letters), then fill the remaining spaces with the rest of the letters of the alphabet in order. People often omitted Q from the list. To encrypt a message, you would break the message into groups of two letters. For example, "CheeseBurger" becomes "Ch ee se Bu rg er", and then you would be map out on the key table. If both letters are the same (or only one letter is left), add an "X" after the first letter. Encrypt the new pair and continue. If the letters appear on the same row of your table, replace them with the letters to their immediate right. If the letters appear on the same column of your table, replace them with the letters immediately below. ADFGVX Cipher - This was the first cipher used by the German Army during World War I. It was invented by Colonel Fritz Nebel in 1918. This was a transposition cipher which used a modified Polybius square with a single columnar transposition used to encode a 36-letter alphabet. This was actually an extension of an earlier cipher called ADFGX. The key for this algorithm is a six-by-six square of letters. This is known as a Polybius square. It is comprised of the letters of the alphabet and the numbers 0 through 9 distributed randomly in the square. The letters A, D, F, G, V, and X are used as coordinates for the square.

Examples of poly-alphabetic substitution

Published by the German engineering firm Seimans in 1993 The__________ (FIbonacci SHrinking) cipher is a software-based stream cipher using the Lagged Fibonacci generator along with a concept borrowed from the shrinking generator ciphers

FISH

This hash function uses 512-bit blocks and implements preset constants that change after each repetition. Each block is hashed into a 256-bit block through four branches that divides each 512 block into sixteen 32-bit words that are further encrypted and rearranged. Because the four branches are used in parallel, whereas SHA-256 uses four serial rounds, ____________ is hard to analyze.

FORK-256

This is the most basic tool for breaking most classical ciphers. In natural languages, certain letters of the alphabet appear more frequently than others. By examining those frequencies, you can derive some information about the key that was used. This method is very effective against classic ciphers like Caesar, Vigenère, etc. It is far less effective against modern methods.

Frequency Analysis

This hash algorithm was initially defined in the Russian national standard and produces a fixed-length output of 256 bits. The input message is broken up into chunks of 256-bit blocks. If a block is less than 256 bits, then the message is padded by appending as many zeros to it as are required to bring the length of the message up to 256 bits. The remaining bits are filled up with a 256-bit integer arithmetic sum of all previously hashed blocks and then a 256-bit integer representing the length of the original message, in bits, is produced.

GOST

The attacker discovers a functionally equivalent algorithm for encryption and decryption, but without learning the key.

Global deduction

What provides all 3 of the following? -Authentication -Integrity -Non-repudiatio

Good digital signature schemes

An ________________________ adds a key to a hash to improve integrity.

HMAC or Hash Message Authentication Code

HTTP running over SSL.

HTTP Secure (HTTPS)

HTTPS means _________________ with either SSL (older) or TLS (newer). The certificate must be installed on the web server for the website to use it.

HTTP secured

A _____ is a function that takes a variable-size input m and returns a fixed-size string.

Hash

A one-way mathematical operation that reduces a message or data file into a smaller fixed length output, or hash value. Variable data input (of any size) + hashing algorithm = fixed bit stream output (hash value) MD5 = 128 bits SHA1 = 160 bits

Hash Function

Cryptographic hash function that uses a symmetric key value and is used for data integrity and data origin authentication.

Hashed message authentication code (HMAC)

A non-secret binary vector used as the initializing input algorithm for the encryption of a plaintext block sequence to increase security by introducing additional cryptographic variance.

IV (Initialization Vector)

Similar to Differential Cryptanalysis, but uses a different technique. Uses sets or even multisets of chosen plaintexts of which part is held constant and another part varies through all possibilities.

Integral cryptanalysis

The_________________ is a block cipher. The algorithm was published in 1991 and was designed by James Massey and Xuejia Lai. It operates on 64-bit blocks and has a 128-bit key. The algorithm consists of a series of eight identical transformations (each round) and an output transformation. It was designed as a replacement for DES.

International Data Encryption Algorithm (IDEA)

protocol suite provides a method of setting up a secure channel for protected data exchange between two devices.

Internet Protocol Security (IPSec)

Used to store, distribute, and maintain cryptographic session and secret keys.

Key Distribution Center (KDC)

Refers to the generation of sub keys from a single key.

Key schedule

Works at Layer 2 of the OSI model. Combination of PPTP and Cisco's Layer 2 Forwarding Protocol (L2F). Offers additional methods for authentication; PPTP offers two, whereas L2TP offers five. In addition to CHAP and EAP, L2TP offers PAP, SPAP, and MS-CHAP. L2TP works over standard IP networks, but also X.25 and ATM.

Layer 2 Tunneling Protocol (L2TP)

The most common steganography method is _____________________.

Least Significant Bits (LSB)

A known-plaintext attack and uses a linear approximation to describe the behavior of the block cipher. Given sufficient pairs of plaintext and corresponding ciphertext, bits of information about the key can be obtained and increased amounts of data will usually give a higher probability of success. Invented by Mitsarue Matsui.

Linear Cryptanalysis

Algorithm that was chosen for the Data Encryption Standard, which was altered and renamed Data Encryption Algorithm.

Lucifer

128 bit hash. RFC 1321

MD5

Stands for Menezes-Qu-Vanstone and is a protocol used for key agreement that is based on DH. Incorporated in public key standard IEEE P1363

MQV

Is an authentication key agreement cryptography function very similar to Diffie-Hellman.

MQV (Menezes-Qu-Vanstone)

Cryptanalysis attack that tries to uncover a mathematical problem from two different ends.

Meet-in-the-middle attack

Mn - 2^(n) -1 Where n is a prime number Works for n 2, 3, 5, 7 but fails on n = 11 and on many other n value

Mersenne Primes

technical specification indicating how multimedia data and e-mail binary attachments are to be transferred.

Multipurpose Internet Mail Extensions (MIME)

The binary ______ operation checks to see whether there is a one in either or both numbers in a given place. If so, then the resultant number is one. If not, the resultant number is zero.

OR

Plain-text is equal to the encryption function (E) with the key (k) and the ciphertext (c) being passed as parameters to that function

P= E(k,c) Symmetric decryption

This algorithm was published in a paper by Ross Anderson as an improvement on FISH. Anderson showed that Fish was vulnerable to known plaintext attacks. It is both faster and stronger than FISH.

PIKE

• Confidentiality • Access control • Integrity • Authentication • Nonrepudiation

PKI services

_______________ is the simplest form of authentication where the user's name and password are transmitted over a network and compared to a table of name-password pairs. Typically, the passwords stored in the table are encrypted; however, the transmissions of the passwords are in cleartext, unencrypted. This is it's main weakness. The Basic Authentication feature built into HTTP uses this form of authentication.

Password Authentication Protocol (PAP)

Works at Layer 2 of the OSI model. Offers the ability to encrypt and authenticate. Uses EAP and/or CHAP to authenticate. Uses Microsoft Point to Point Encryption (MPPE) for encryption. (MPPE is a derived version of DES). ONLY works over standard IP Networks.

Point to Point Tunneling Protocol (PPTP)

A server or client that Kerberos can assign tickets to. Basically, any machine that can be assigned tickets is known as a _____________________.

Principal

Each block of plaintext is XORed with the XOR of the previous plaintext block and the previous ciphertext block before being encrypted. As with CBC mode, an initialization vector is used in the first block.

Propagating Cipher Block Chaining (PCBC)

A ___________________ is used to take the burden off of a CA by handling verification prior to certificates being issued. It acts as a proxy between a user and CA and it receives a request, authenticates it and forwards it to the CA.

RA (Registration Authority)

____________________________ is a 160-bit hash algorithm developed by Hans Dobbertin, Antoon Bosselaers, and Bart Preneel. There exist 128-, 256-, and 320-bit versions of this algorithm, called RIPEMD-128, RIPEMD-256, and RIPEMD-320, respectively. These all replace the original RIPEMD which was found to have collision issues. The larger bit sizes make this far more secure that MD5 or RIPEMD.

RACE Integrity Primitives Evaluation Message Digest (RIPEMD-160)

Ron Rivest created this algorithm in 1987 and it stands for Ron's Cipher. It is the most widely used software stream cipher. The algorithm is used identically for encryption and decryption as the data stream is simply XORed with the key. It uses a variable length key from 1 to 256 bytes. That key constitutes a state table that is used for subsequent generation of pseudo-random bytes and then to generate a pseudo-random stream which is XORed with the plaintext to produce the ciphertext. It generates a pseudo-random stream of bits.

RC4

Stream symmetric cipher that was created by Ron Rivest of RSA. Used in SSL and WEP.

RC4

The algorithm is used identically for encryption and decryption as the data stream is simply XORed with the key. RC4 uses a variable-length key from 1 to 2048 bits, (minimum of 40 bits or higher to be considered secure). That key constitutes a state table that is used for the subsequent generation of pseudo-random bytes and then to generate

RC4

Developed in 1977 by three mathematicians, Ron Rivest, Adi Shamir, and Len Adleman. Based on the practical difficulty of factoring the product of two large prime numbers. Key sizes are typically from 1,024 - 4,096 bits.

RSA

Responsible for the accuracy of the information contained in a certificate request. The _______________ is a proxy for the CA and also expected to perform user validation before issuing a certificate request.

Registration authority (RA)

This is a 160-bit hash function which resembles the earlier MD5 algorithm. This was designed by the NSA to be part of the digital signature algorithm.

SHA-1

This is actually two similar hash functions, with different block sizes, known as SHA-256 and SHA-512. They differ in the word size; SHA-256 uses 32-byte (256 bit) words where SHA-512 uses 64-byte (512 bit) words. There are also truncated versions of each standardized, known as SHA-224 and SHA-384. These were also designed by the NSA.

SHA-2

This is a proposed hash function standard still in development. This is being chosen in a public review process from non-government designers. An ongoing NIST hash function competition is scheduled to end with the selection of a winning function, which will be given the name SHA-3 in 2012.

SHA-3

___________ was invented by a team of cryptographers including Vincent Rijmen, Joan Daemen, Bart Preneel, Antoon Bosselaers, and Erik De Win. It uses a 64-bit block with a 128-bit key and operates in six rounds.

SHARK

_____ was developed by Netscape and has since been supplanted by TLS. It was the preferred method used with secure websites (i.e. https).

SSL

_____________________ was a cylinder tool used by the Greeks, and is often specifically attributed to the Spartans. It was a physical cylinder that was used to encrypt messages. Turning the cylinder produced different ciphertexts. While it is not clear exactly how old this cipher is, it was first mentioned in the 7th century BC by the Greek poet Archilochus. The recipient uses a rod of the same diameter as the one used to create the message. He then wraps the parchment to read the message. To encrypt, one simply writes across the leather.

Scytale

Like Blowfish, _________ is a symmetric key block cipher which was a finalist in the AES contest. This algorithm was designed by Ross Anderson, Eli Biham, and Lars Knudsen. It has a block size of 128 bits and can have a key size of 128, 192, or 256 bits, much like AES. The algorithm is also a substitution-permutation network like AES. It uses 32 rounds working with a block of four 32-bit words. Each round applies one of eight 4-bit to 4-bit S-boxes 32 times in parallel. It was designed so that all operations can be executed in parallel.

Serpent

It is impossible to compress the data such that the code is less than the Shannon entropy of the source, without it being virtually certain that information will be lost

Shannon's source coding theorem

Related to entropy, ________________ states: it is impossible to compress the data such that the code rate is less than the Shannon entropy of the source, without it being virtually certain that information will be lost.

Shannon's source coding theorem

Attack that uses information (timing, power consumption) that has been gathered to uncover sensitive data or processing functions.

Side-channel attack

Designed by NSA for the clipper chip, ___________ uses an 80-bit key to encrypt or decrypt 64-bit data blocks. It is an unbalanced Feistel network with 32 rounds.

Skipjack

Developed by the NSA for use in the clipper chip. Skipjack uses an 80-bit key to encrypt or decrypt 64-bit data blocks. It is an unbalanced Feistel network with 32 rounds.

Skipjack

Manipulating individuals so that they will divulge confidential information, rather than by breaking in or using technical cracking techniques.

Social engineering attack

Cryptanalysis attack that uses identified statistical patterns.

Statistical attack

A process that puts a message into the least significant bits of a binary file is called what?

Steganography

_________________ is the art and science of writing hidden messages in such a way that no one, apart from the sender and intended recipient, suspects the existence of the message. It is a form of security through obscurity. By altering the least significant bit, one can hide additional data without altering the original file in any noticeable way.

Steganography

Payload - The data to be covertly communicated, the message you wish to hide Carrier - The signal, stream, or data file into which the payload is hidden Channel - The type of medium used. This may be still photos, video, or sound files

Steganography Terms

If a cryptanalysis uncovers a method that can derive a key for an algorithm, but is only slightly faster than brute force, what is this called?

Success

Encryption method where the sender and receiver use an instance of the same key for encryption and decryption purposes.

Symmetric

This hash function was designed by Ross Anderson and Eli Biham in 1995 and is 192 bits. It is designed using the Merkle-Damgård construction (sometimes call the Merkle-Damgård paradigm). This is a method to build collision-resistant cryptographic hash functions from collision-resistant one-way compression functions. The Merkle-Damgård construction was described in Ralph Merkle's Ph.D. dissertation in 1979.

TIGER

The input message is broken into 512-byte chunks (16-32 bit integers). The message is padded with zeros if needed to reach 512-byte chunks. The length of the message (before padding) is then appended as the last 64 bits of the message. The algorithm operates on a 128-bit state, divided into four 32-bit words, denoted A, B, C, and D. They are initialized to an initial variable. The algorithm consists of four stages or rounds, each of which consists of 16 similar operations. Those operations are a non-linear function F, a modular operation, and a shift.

The MD5 Algorithm

The ticket that is granted during the authentication process.

Ticket Granting Ticket (TGT)

_________________ is a protocol for encrypting transmissions. A client and server negotiate a connection by using a handshaking procedure, in which the client and server agree on various parameters used to establish the connection's security.

Transport Layer Security (TLS)

The payload of the message is protected

Transport mode

Open-community and standardized version of SSL but TLS is more extensible and is backward compatible with SSL.

Transport-Layer Security (TLS)

Microchip installed on the motherboard of modern computers and is dedicated to carrying out security functions that involve the storage and processing of symmetric and asymmetric keys, hashes, and digital certificates.

Trusted Platform Module (TPM)

A variation of the Feistel network called an ______________ cipher. They use a modified structure where L0 and R0 are not of equal lengths. This means that L0 might be 32 bits and R0 could be 64 bits (making a 96-bit block of text). This variation is actually used in the Skipjack algorithm.

Unbalanced Feistel

In order for User A to send User B an encrypted message that only User B can read, User A must encrypt message with which of the following keys?

User B's public key

Which of the following was a multi alphabet cipher widely used from the 16th century to the early 20th century?

Vigenere

____________ uses the stream cipher RC4 (128 bit or 256 bit). For a 24-bit IV, there is a 50% probability the same IV will repeat after 5000 packets

WEP (Wired Equivalent Privacy)

__________ is an international standard for the format and information contained in a digital certificate and is the most common type of digital certificate in the world. It was first issued on July 3, 1988. It is a digital document that contains a public key signed by the trusted third party, which is known as a Certificate Authority, or CA. Relied on by S/MIME, it contains your name, info about you, and signature of the person who issued the certificate.

X.509

The binary ______ operation impacts your study of encryption the most. It checks to see whether there is a one in a number in a given place, but not in both numbers at that place. If it is in one number but not the other, then the resultant number is one. If not, the resultant number is zero. It has a very interesting property in that it is reversible.

XOR

There are two types of symmetric algorithms. They are ______________ and ______________. A block cipher literally encrypts the data in blocks. 64-bit blocks are quite common, although some algorithms (like AES) use larger blocks. For example, AES uses a 128-bit block. Stream ciphers encrypt the data as a stream, one bit at a time.

block ciphers; stream ciphers

In _____________, the previous ciphertext block is encrypted then the ciphertext produced is XORed back with the plaintext to produce the current ciphertext block. Essentially it loops back on itself, increasing the randomness of the resultant ciphertext. Allows encryption of partial blocks rather than requiring full blocks for encryption. This eliminates the need to pad a block like in CBC.

cipher feedback mode (CFB)

When using _____________ mode, each block of plaintext is XORed with the previous ciphertext block before being encrypted. This means there is significantly more randomness in the final ciphertext. This is much more secure than electronic codebook mode and is the most common mode.

cipher-block chaining (CBC)

A ____________________ is what most people mean when talking about breaking an encryption system. This is the situation in which Alice and Bob are encrypting their data, and all you as the attacker get to see is the ciphertext. Trying to decrypt a message if you only know the ciphertext is called a ciphertext-only attack. This is the most difficult type of attack, because you have the least amount of information.

ciphertext-only attack

A __________________ is any nontrivial method that detects a difference between the ideal encryption scheme and the actual one. This covers all the attacks we have discussed so far, as well as any yet-to-be-discovered attacks.

distinguishing attack

A _______ function H is a function that takes a variable-size input m and returns a fixed-size string. The value that is returned is called the hash value h or the digest. This can be expressed mathematically as h = H(m). An example of this is Windows will store that in the Security Accounts Manager (SAM) file in the Windows System directory. When you log on, Windows cannot "un-hash: your password (remember it is one way). So, what Windows does is take whatever password you type in, hash it, then compare the result with what is in the SAM file. If they match (exactly), then you can log in.

hash

An ______________ is a fixed-size input to a cryptographic primitive that is random or pseudo-random. It is added to a cryptographic algorithm and key in order to increase the randomness of the resultant cipher text.

initialization vector (IV)

For practical reasons, a PKI is often set up with multiple levels of CAs. There is a top-level CA, called the ________, which issues certificates on the keys of lower-level CAs, which in turn certify the user keys.

root

In relationship to hashing, the term "________" refers to random bits that are used as one of the inputs to the hash. Furthermore, it complicates dictionary attacks that use pre-encryption of dictionary entries. It also is very effective against rainbow table attacks.

salt

A _____________ cipher is one for which no attack exists.

secure block

Component that keeps track of the different SAs and tells the device which one is appropriate to invoke for the different packets it receives.

security parameter index (SPI)


Set pelajaran terkait

Intro to Psych Comprehensive Exam Final

View Set

日本語のまねきねこ・だい1か

View Set

Chapter 11 Middle Adulthood: Ages 40-65

View Set

Health Insurance Policy Provisions, Clauses, and Riders

View Set

Financial & Managerial Accounting Midterm Prep

View Set

GCP Associate Cloud Engineer (ACE) Prep

View Set