FCPS Security + Encryption Methods (UPDATED)

Ace your homework & exams now with Quizwiz!

CBC

Cipher Block Chaining | first block is ran through an initialization vector before being encrypted. The next block is XORed with the block before it.

CAC

Common Access Card - smart card used by US Department of Defense

Cipher Feedback

Each bit produced in the keystream is the result of a predetermined number of fixed ciphertext bits - Authentication

WPA2

WiFi Protected Access 2 | utilizes AES as a modern form of encryption

WPA

WiFi Protected Access | encryption method to protect WiFi

WEP

Wired Equivalence Protocol. Wireless network encryption system.

Block Cypher

A block cipher is a method of encrypting text (to produce ciphertext) in which a cryptographic key and algorithm are applied to a block of dat

Output Feedback

A block cipher mode of operation that turns a block cipher into a synchronous stream cipher

Blowfish

A block cipher that operates on 64-bit blocks and can have a key length from 32 to 448 bits.

Diffie-Hellman

A cryptographic algorithm that allows two users to share a secret key securely over a public network.

PGP (Pretty Good Privacy)

A key-based encryption system for e-mail that uses a two-step verification process.

Public Key Encryption

A method of paired key encryption in which the key used to encrypt data is made available to anybody and its corresponding decryption key is kept secret.

Confusion

A process of making input seem unconnected to a key input in an encryption algorithm

TKIP (Temporal Key Integrity Protocol)

A security protocol created by the IEEE 802.11i task group to replace WEP.

encryption key

A set of characters that the originator of the data uses to encrypt the plaintext and the recipient of the data uses to decrypt the ciphertext.

Quantum Cryptography

A type of asymmetric cryptography that attempts to use the unusual and unique behavior of microscopic objects to enable users to securely develop and share keys.

private key encryption

A type of encryption where only the two parties involved in sending the message have the code.

AES

AES (acronym of Advanced Encryption Standard) is a symmetric encryption algorithm. The algorithm was developed by two Belgian cryptographer Joan Daemen and Vincent Rijmen

SHA-512

An implementation of SHA-2 using a 512-bit hash.

SRTP

Secure Real-Time Protocol

DAC

Discretionary Access Control - means of restricting access to objects based on the identity of the user or group to which they belong

AES

ES was designed to be efficient in both hardware and software, and supports a block length of 128 bits and key lengths of 128, 192, and 256 bits

Asymetric Encryption

Asymmetric Encryption is a form of Encryption where keys come in pairs. What one key encrypts, only the other can decrypt

Authentication in RSA

Can be used to authenticate or identify another person or entity since each entity has an associated private key that no one else has access to

CA

Certificate Authority

CRL

Certificate Revocation List

CTR

Counter | Has a ash value and a counter that increments each time a block is encrypted

DES

DES is a block cipher, and encrypts data in blocks of size of 64 bit each, ... The same algorithm and key are used for encryption and decryption

ECC Algorithm

Elliptic Curve Cryptography | a public key encryption technique based on an elliptic curve theory that can be used to create more efficient keys

GPG

GNU Privacy Guard | a different implementation of the open PGP standard

Honey encryption

Honey encryption is a type of data encryption that "produces a ciphertext, which, when decrypted with an incorrect key as guessed by the attacker, presents a plausible-looking yet incorrect plaintext password or encryption key

IKE

Internet Key Exchange - provides authenticated key management and authenticates involved peers with IPsec

Triple DES

Matches 3 DES keys, leading to an effective 168 bit key size | 3 iterations of rounds per block

MD-5

Message digest 5A. popular type of hash encoding algorithm.

NFC Attack

Near Field Communication Attack | eavesdropping and replay attack on NFC signals

OCSP

Online Certificate Status Protocol

OTA

Over The Air

SHA-2

The second revision of SHA, also designed by the NSA, which supports a variety of hash sizes, the most popular of which are SHA-256 and SHA-512.

Encryption

Process of converting readable data into unreadable characters to prevent unauthorized access.

SHA-1

Produces a 160-bit hash value and is used in DSS

RC 5

RC5 is a block cipher and addresses two word blocks at a time.

RSA Encryption

RSA (Rivest-Shamir-Adleman) is the most common internet encryption and authentication system. The system used an algorithm that involves multiplying two large prime numbers to generate a public key, used to encrypt data and decrypt an authentication, and a private key, used to decrypt the data and encrypt an authentication.

Asymmetric Algorithms

RSA, ECC, Diffie-Hellman, El Gamal, Knapsack, and DSA

RFID Attack

Radio Frequency Identifier Attack | a Denial of Service attack that jams the signal with noise interference

RADIUS

Remote Authentication Dial-In User Service - centralized wireless authentication system

RC4 Encryption

Stream cipher that encrypts bit by bit

Symmetric Encryption

Symmetric encryption is a type of encryption where only one key (a secret key) is used to both encrypt and decrypt electronic information

Streaming Cipher

Symmetric key cipher where plaintext digits are encrypted bit by bit

Fuzzing

Technique used to discover security loopholes in software or networks

A honey pot is used for what purpose?

To delay intruders in order to gather auditing data

TPM

Trusted Platform Module - chip on device that stores RSA encryption keys specific to the host system

Twofish

Twofish is a symmetric key block cipher with a block size of 128 bits and key sizes up to 256 bits

Block Cipher

a method of encryption that processes blocks of data rather than streams

Stenography Encryption

data hidden within data. Steganography is an encryption technique that can be used along with cryptography as an extra-secure method in which to protect data. Steganography techniques can be applied to images, a video file or an audio file

obfuscation

the action of making something obscure, unclear, or unintelligible


Related study sets

Intro to Human Biology (Test 2 study guide)

View Set

Lab 6. Petrology of Basaltic Rocks

View Set

Neurobiology Exam 1 (Chapters 1-5)

View Set