Shared Flashcard Set

Details

CEH Certified Ethical Hacker-312-50:Encryption/Hash
CEH Certified Ethical Hacker-312-50 Encryption/Hash
35
Computer Science
Professional
03/16/2013

Additional Computer Science Flashcards

 


 

Cards

Term
DES: Type and # of bits in key
Definition
Symmetric algorithm / Block / 56 bit key
Term
3DES: Type and # of bits in key
Definition
Symmetric algorithm / Block / 168 bit key
Term
AES: Type and # of bits in key
Definition
Symmetric algorithm / Block 128, 192 or 256 bit keys
Term
IDEA: Type and # of bits in key
Definition
Symmetric algorithm / Block / 128 bit key
Term
Twofish: Type and # of bits in key
Definition
Symmetric algorithm / Block / 256 bit key
Term
Symmetric Encryption AKA (2)
Definition
Single key / shared key
Term
Symmetric Encryption drawbacks (2)
Definition
Key sharing is complicated / scalability issue (too many keys needed)
Term
Symmetric Encryption advantages (2)
Definition
Fast / simple
Term
Typical block size of symmetric key encryption
Definition
64 bits
Term
Block ciphers use these two methods to encrypt
Definition
Substitution / Transposition
Term
Name four Asymmetric Encryption types
Definition
Diffie-Hellman, Elliptic Curve Cryptosystem (ECC), El Gamal, RSA
Term
MD5 stands for / hash size / relevance
Definition
Message Digest algorithm / 128 bit / declared vulnerable inĀ 2010
Term
SHA-1: hash size / relevance
Definition
160 bits / determined vulnerable in 2005 but still widely used
Term
SHA-2: hash size / relevance
Definition
4 hash sizes depending on algorithm: 224, 256, 384, 512 bits / not widely used but replacement for SHA-1
Term
Hashing algorithm is vulnerable to what? Describe / frequency of success / prime example of use
Definition
Collision attack: When 2 or more files create the same output / extremely rare / find another word (password) with the hash and use the other word to get into the system.
Term
What is used to assist in a collision attack on a hash?
Definition
Rainbow table
Term
Hashes are primarily used for what? How?
Definition
Integrity checking. If recalculation on the file shows a different hash than the original, the file cannot be trusted.
Term
Name the encryption method which hides messages in plain sight?
Definition
Steganography
Term
What is current PKI world standard version number?
Definition
X.509
Term
From what can the public key be retrieved?
Definition
Digital Certificate
Term
Name the four primary cryptography attacks
Definition
Known plaintext, Ciphertext-only, Replay attack, Chosen cipher
Term
Name four avenues of encrypted communications
Definition
Secure shell (SSH), Secure Socket Layer (SSL), Internet Protocol Security (IPSec), Point-to-point tunneling Protocol (PPTP)
Term
PPTP stands for
Definition
Point-to-point tunneling Protocol
Term
SSL stands for
Definition
Secure Socket Layer
Term
SSH stands for
Definition
Secure shell
Term
IPSec stands for
Definition
Internet Protocol Security
Term
Do these two things to ensure your encryption is effectively uncrackable
Definition
Use a large key / change the key on a regular basis
Term
Encryption algorithms turn what into what
Definition
Plaintext into ciphertext
Term
This term is is applicable when both parties cannot deny the message was sent /received
Definition
Non-repudiation
Term
In asymmetric encryption, what type of key is used for encryption?
Definition
Public key (used for what in asymmetric encryption)
Term
In asymmetric encryption, what type of key is used for decryption?
Definition
Private key (used for what in asymmetric encryption)
Term
Asymmetric algorithms solve what three problems?
Definition
Scalability, key exchange issue, lack of non-repudiation in symmetric algorithms
Term
This can be used to protect against collision attacks and rainbow tables / define
Definition
Salt / extra random bits
Term
This term is used for the practice of trying every possible combination to break a code
Definition
Brute force attack
Term
XOR Operation weakness
Definition
If the key is smaller than the data, the cipher will be vulnerable to frequency attacks.
Supporting users have an ad free experience!