Shared Flashcard Set

Details

CEH Certified Ethical Hacker 312-50:Cryptography
CEH Certified Ethical Hacker 312-50 : Cryptography
58
Computer Science
01/23/2014

Additional Computer Science Flashcards

 


 

Cards

Term
Public encrypts; private decrypts in what encryption type?
Definition
Asymmetric encryption
Term
Function which creates a signature of a file. Helps in proving integrity.
Definition
Hash function
Term
Study of protecting information, whether in transit or at rest.
Definition
Cryptography
Term
Data to be encrypted.
Definition
Plaintext
Term
In cryptography, the term for encrypted data
Definition
Ciphertext
Term
Rendering sender unable to deny they sent something.
Definition
Nonrepudiation
Term
Cipher method in which bits are encyrpted one bit at a time.
Definition
Stream Cipher
Term
Encrypted in sets of data, usually 64 bits at a time
Definition
Block cipher
Term
Substitution and transposition are algorithms used in which encryption method.
Definition
Block Cipher
Term
Primary algorithm used in stream cipher.
Definition
XOR operation
Term
Speed is a benefit of which encryption method.
Definition
Symmetric
Term
XOR Operation weakness
Definition
If the key is smaller than the data, successful cryptanalysis is possible via frequency attack
Term
De Facto encryption standard
Definition
RSA
Term
multiplies two prime numbers.
Definition
RSA
Term
Key size up to 4096
Definition
RSA
Term
Used for encryption and digital signatures
Definition
RSA
Term
Key Escrow
Definition
Repository for government encryption access when there are legal issues, such as subpoenas
Term
Asymmetric encryption disadvantage
Definition
Requires large encryption keys.
Term
IDEA
Definition
used mainly in Europe
Term
RC
Definition
Rivest Cipher
Term
RC4 cypher type
Definition
Stream
Term
RC5 cipher type
Definition
block
Term
RC6 cipher type
Definition
Block
Term
Symmetric Encryption AKA (4)
Definition
Single / secret / shared / private
Term
Symmetric Encryption drawbacks (2)
Definition
Key sharing is complicated / Scalability
Term
Typical data block size of symmetric key encryption
Definition
64 bits
Term
Encryption method which replaces character with another character, or bit with another bit.
Definition
Substitution
Term
Transposition (def)
Definition
Scramble the characters
Term
Diffie-Hellman encryption type
Definition
asymmetric
Term
Diffie-Hellman used in which two protocols
Definition
Encryption used in IPSEC and SSL protocols
Term
Diffie-Hellman vulnerable to...
Definition
Vulnerable to man-in-the-middle attacks (MITM) when digital signature use is waived
Term
ECC
Definition
Elliptic Curve Cryptosystem
Term
Elliptic Curve Cryptosystem (ECC)used on what devices?
Definition
Encryption method used by mobile devices
Term
Elliptic Curve Cryptosystem (ECC) benefit
Definition
Uses less computational power
Term
El Gamal (difference from RSA)
Definition
Encryption method not based on prime number factoring
Term
El Gamal algorithm
Definition
Uses discrete logarithm problems for encryption and digital signatures
Term
First government accepted digital signature scheme
Definition
DSA
Term
First government accepted digital signature scheme; it meets Digital Signature Standard (DSS), one of the Federal Information Processing Standards (FIPS)
Definition
DSA
Term
Hash function(definition)
Definition
Any algorithm that maps data of variable length to data of a fixed length
Term
Results of hashing function (5 synonyms)
Definition
hashes, hash values, hash codes, hash sums, checksums
Term
Used to crack a hash algorithm
Definition
Collision attack
Term
Collision (hash, definition)
Definition
When 2 or more files create the same output from a hash function
Term
PKI
Definition
Public Key Infrastructure
Term
CA
Definition
Certificate authority
Term
RA
Definition
Registration Authority
Term
Trust Models (3)
Definition
Web of Trust / Single authority System / Hierarchical Trust System
Term
Web of Trust
Definition
User trust certificates they have exchanged with another person, and further they trust everyone who the other person trusts and so on
Term
Single authority System
Definition
There is one entity which holds all certificates-the Certificate Authority
Term
Hierarchical Trust System
Definition
There is a certificate authority at the top and then all the entities below it which are trusted by the certificate authority to do their job on their behalf
Term
Fields in a digital certificate (8)
Definition
Public key, Serial Number, Subject/Algorithm, Issuer, Valid From date, Valid To date, Key Usage (purpose of use), optional fields
Term
Current PKI world standard version number
Definition
X.509
Term
key size is deemed by the US government as uncrackable
Definition
256
Term
Avenues of encrypted communications
Definition
(SSIP) Secure shell (SSH) / Secure Socket Layer (SSL) / Internet Protocol Security (IPSec) / Point-to-point tunneling Protocol (PPTP)
Term
Two things to ensure your encryption is effectively uncrackable
Definition
Use a large key, Change the key on a regular basis
Term
Encryption algorithms turn what into what?
Definition
Plaintext into ciphertext
Term
When both parties cannot deny the message was sent /received
Definition
Non-repudiation
Term
Encryption method which cannot be broken if the message is truly random, used only once and has no repeating patterns
Definition
One-time pad
Term
Name three problems which symmetric encryption algorithms have that asymmetric encryption algorithms do not
Definition
Scalability issue / key exchange issue / lack of non-repudiation