• Shuffle
    Toggle On
    Toggle Off
  • Alphabetize
    Toggle On
    Toggle Off
  • Front First
    Toggle On
    Toggle Off
  • Both Sides
    Toggle On
    Toggle Off
  • Read
    Toggle On
    Toggle Off
Reading...
Front

Card Range To Study

through

image

Play button

image

Play button

image

Progress

1/54

Click to flip

Use LEFT and RIGHT arrow keys to navigate between flashcards;

Use UP and DOWN arrow keys to flip the card;

H to show hint;

A reads text to speech;

54 Cards in this Set

  • Front
  • Back
  • 3rd side (hint)

Scytale

Cryptographic Technique functioned by wrapping a strip of papyrus or leather around a rod of fixed diameter on which a message was written

Caesars Cipher

Cryptographic Technique worked by means of simple substitution.


(ROT3) Rotatated by three characters.

Cryptographic Goals

(PAIN)


Privacy


Authentication


Integrity


Non-repudiation

(PAIN)

Privacy

Also called confidentiality. What is private should stay private, whether at rest or in transit

Authentication

Proof that the message is from the person or entity we believe it to be from

Integrity

Information should remain unaltered at the point it was produced, while it is in transmission, and during storage.

Non-repudiation

The sender of the data is provided with proof of delivery and the recipient is assured of the senders identity.

Plain text

Clear text that is readable

Cipher Text

Encrypted text that is unreadable.

Encryption

Transforming data into a unreadable format.

Cryptanalysis

The act of obtaining plain text from cipher text without a cryptographic key.

Digital Signature

A hash value that has been encrypted with the private key of the senders.


(Authentication and Integrity)

Chain of Trust

The relationship between subordinate certificate authorities.

Root of Trust

Concept of Trust in a system, software, or data.

Attestation

Validating something as true.

Trusted Platform Module (TPM)

Most common form of Root of Trust.


Defined by the endorsement key (EK) pair.

Symmetric Cryptography

Uses single private key.

Asymmetric Cryptography

Uses two keys:


Public key: know to everyone


Private key: only recipient uses.

Hash

Mathematical procedure or function that converts a large amount of data into a fixed small string of data or integer.

Algorithm

Set of rules or ordered steps used to encrypt and decrypt data.

Cipher Text

Data that is scrambled and unreadable.

Block Cipher

Function by dividing the message into blocks for processing.



Common is 64-bit blocks

Stream Cipher

Function by dividing the message into bits for processing.



Inputs digits, bits, or characters and encrypts the stream of data.



Combines the plain text bit with a pseudorandom cipher bit stream by means of an exclusive operation. (OR) (XOR)



Higher speed than block cipher.


Hardware implementation.

Cryptographic Key

Used to control the transformation of plain text to cipher text and cipher text to plan text.

Entropy

Randomness of the key.


(Cryptographic Key)

Nonce

Number used once.


It is as random a number as a cryptographic system can generate.

Pseudorandom number generator

Program that creates a (Nonce) .

Symmetric Encryption

Faster than asymmetric.



Only provides Confidentiality.


Difficult key distribution.


Must operate out of band



Uses a single shared key for encryption and decryption.


Asymmetric Encryption

Easy key exchange


Confidentiality and Authentication


Slower than symmetric



Used only to move small amounts of data.

Transposition Cipher

Type of Block Cipher that shifts units of plain text in a consistent way so that the cipher text constitutes a permutation of the plain text.

Block Cipher Functions

Substitution


Transposition


Confusion


Diffusion

Substitution

Block Cipher Function



Functions by putting into thing in the place of another.


Transposition

Type of Block Cipher



Scrambles a message by reordering the plain text in some definite way.

Confusion

Type of Block Cipher



Uses a relationship between the plain text and the key that is so complicated an attacker can't alter the plain text and determine the key.

Diffusion

A change in the plain text results in multiple changes spread throughout the cipher text.

Substitution Box (s-box)

Technique used to introduce confusion.


Designed to defeat cryptanalysis.


(Look up Table)

Symmetric Algorithms

(DES) Data Encryption Standard


Advanced Encryption Standard


Blowfish


(CAST) Carlisle Adam's/Stafford Tavares


(IDEA) International Data Encryption Algorithm


Rijndael


RC4


RC5


(SAFER) Secure and Fast Encryption Routine


Skipjack


Twofish

Data Encryption Standard (DES)

Was once the most common algorithm used.


All DES has been replaced by AES



Developed by IBM


Modified by NIST



64-bit block that princesses 64 bits of plain text at a time.



Key size: 56-bits



8-bits Parity Checking

Advanced Encryption Standard (AES)

Symmetric Algorithm replacement for (DES).


Adopted from the Rijndael Algorithm.


Used for sensitive and secret data.



Key size: 128, 192, and 256 bits.

Blowfish

Intended as a replacement for (DES)


Variable block size


Up to 448-bit key

Carlisle Adams/Stafford Tavares (CAST)

Replacement candidate for (AES)


128 or 256-bit block cipher.

International Data Encryption Algorithm (IDEA)

Block Cipher that uses a 128-bit key to encrypt 64-bit blocks of plain text.



Used by Pretty Good Privacy (PGP)

Rijndael

Block Cipher adopted as the (AES) by (NIST) to replace (DES)

Rivest Cipher 4 (RC4)

Stream-based Cipher

Rivest Cipher 5 (RC5)

Fast Block Cipher


Supports:


variable block size


variable key size


variable number of rounds



Block Size: 32, 64, and 128-bits



Key: Up to 2040 bits



(ROUND)


A sequential repetition of series of math functions.





Secure and Fast Encryption Routine (SAFER)

Block-based cipher


Processes data in blocks of 64 and 128 bits

Skipjack

Block Cipher, promoted by the (NSA), uses an 80-bit key and operates on 64-bit blocks of text.

Twofish

Block Cipher


128-bit block size


Key: Up to 256-bits

Four Primary Operating Modes of (DES)

(ECB) Electronic Codebook


(CBC) Cipher Block Chaining


(OFB) Output Feedback


(CFB) Cipher Feedback

Electronic Codebook Mode (ECB)

DES Mode of operation



Default mode of encryption used by DES



If the last block is not 64-bits, padding is added.


Produces greatest throughput


Easiest to Crack

Cipher Block Chaining Mode (CBC)

DES Mode of operation



Similar to ECB


Inserts some of the cipher text created from the previous block into the next one.


Process is called XORing

Output Feedback Mode (OFB)

Implemented as a stream cipher, uses plain text to feed back into the stream of cipher text.

Cipher Feedback Mode (CFB)

Implemented as a stream cipher and used to encrypt individual characters.

Triple DES (3DES)

Designed to be a stopgap solution


Certified on a five year basis


Can use 2 or 3 keys to encrypt data.


Key size: 112 or 168-bits


48 rounds of transposition and substitution


Third the speed of 56-bit DES