Shared Flashcard Set

Details

Chapter 3 Encryption
Chapter 3 Encryption
106
Computer Science
Graduate
01/29/2014

Additional Computer Science Flashcards

 


 

Cards

Term
The party trying to prove it's identity is the ____; the other party is the ____
Definition
supplicant
verifier
Term
____ is the first handshaking stage. It is the negotiation of ___ methods to be used in communication.
Definition
Negotiation
cryptographic methods
Term
The two public key encryption ciphers are ____ and ____.
Which is more efficient?
Definition
RSA and ECC (Elliptic Curve Cryptography)
ECC is more efficient.
Term
____ is the strongest cipher with the lowest RAM requirements. The key lengths are ___ ___ and___
Definition
AES
128, 192 256
Term
___ encryption is fast and uses a small amount of RAM, so it is ideal for ____
Definition
RC4
Handheld devices
Term
_____ is used when logging into servers
Definition
Microsoft Challenge-Handshake Authentication Protocol (MS-CHAP)
Term
____ Authenticates a single message with public key encryption.
Definition
Digital Signature
Term
Nearly all encryption for confidentiality uses ____
Definition
Symmetric Key Encryption
Term
When the identity of a communication partner is tested by both sides it is _____
Definition
Authentication
Term
____ variants provide more secure hashing. Never use ___ or ___ as they are unsecured.
Definition
Secure Hash Algorithm (SHA)
MD5 or SHA-1
Term
When encrypting a message digest with it's own private key, this is called ____
Definition
signing
Term
The second handshaking stage is ___
Definition
Initial Authentication
Term
____ use ___ that represent complete words or phrases. Why is this limiting?
Definition
Codes use Code symbols. With enough examples a code can be easily broken.
Term
Step one in creating a digital signature for authentication, the plaintext message is hashed, creating the_____
Definition
Message digest
Term
In ongoing secured communication:
1. The sender sends a(n) ____ to authenticate each message (for message by message authentication)
2. Electronic signatures provide _____
3. The sender encrypts the message and ______
Definition
1. electronic signature
2. message integrity
3. digital signature
Term
___ specifies both the protections to be applied and the mathematical processes that will be used to provide protections.
Definition
Cryptographic system standard
Term
_____ is sending keys or secrets securely.
Definition
Keying
Term
____ is a specific set of options in SSL/TLS.
Definition
Cipher Suite
Term
Protections are now provided by a(n) ____ which is a packaged set of cryptographic countermeasures for protecting dialogues.
Definition
Cryptographic system
Term
A cipher where the letters are moved around within a message, based on their initial position in the message.
Definition
transposition cipher
Term
____ is when both parties authenticate themselves.
Definition
Mutual authentication.
Term
As the duration of key use increases, so does traffic volume and so must ____ for security
Definition
Key length.
Term
___ is trying all possible keys until the correct one is found
Definition
Exhaustive search
Term
____ turns the cipher text back to plaintext.
Definition
decryption
Term
Public key encryption can be used to deliver ____ securely
Definition
Symmetric session keys
Term
What are the most common ciphers
Definition
RC4, DES, 3DES and AES
Term
____ is based on password authentication on servers.
Definition
Microsoft Challenge-Handshake Authentication Protocol (MS-CHAP)
Term
____: which means that people who intercept messages can't read them.
Definition
Confidentiality
Term
The simplest type of cryptanalysis is ____; which is trying all possible keys until the cryptanalyst finds the right key.
Definition
Brute force key cracking
Term
In public key encryption, each party has two keys. What are they?
Definition
Public and private key
Term
A cipher that both parties encrypt and decrypt with the same key.
Definition
Symmetric key encryption
Term
A random string of 40 to 4,000 bits.
Definition
Key
Term
____ extends the effective key size of ____ by applying the algorithm multiple times in a row. How many times does it apply the algorithm?
Definition
3DES
DES
Three times
Term
In step 2 of producing a digital signature, the sender encrypts the message with their own private key. This creates the ____.
Definition
Digital Signature
Term
In order to have confidentiality, communication partners need to keep the ____ secret, not the ____.
Definition
Key
Cipher
Term
____ was the original purpose for cryptology.
Definition
Encryption for confidentiality
Term
____ is converting the message's bits by dividing it by a number and using the remainder. This process is ____.
Definition
Hashing
Irreversible
Term
Real world ciphers mix several rounds of both ____ and ____ to ensure randomness.
Definition
Substitution
Transposition
Term
____ is the crptographic process that turns plaintext into a seemingly random stream of bits called ____.
Definition
Encryption
Cipher text
Term
Using public key encryption for authentication, the supplicant proves it knows something no one else will, the true party's ____.
Definition
Private Key
Term
By using a random ____, the cipher can make it impossible to analyze the text by letter frequency.
Definition
Key
Term
Key that are prohibitively time consuming to crack.

How long do they have to be today to be considered strong?
Definition
Strong symmetric keys

100 bits
Term
A cipher where one character is substituted for another, but the character position isn't changed.
Definition
Substitution cipher
Term
On average, a cryptographer will have to try ____ of all keys before succeeding.

What is the formula to calculate the number of attempts before succeeding?
Definition
Half

(2^N/2) where N= key length (in bits)
Term
Most math processes in ciphers use variations of two basic math processes. ____ and ____.
Definition
Substitution
Transposition
Term
Ciphers use ____ rounds of computations.
Definition
Multiple
Term
____ is the original, unencrypted, message.
Definition
Plaintext
Term
Ciphertext encrypted with proprietary algorithms are typically cracked ____, even if the attacker doesn't know the detailed cipher.
Definition
Faster/quickly
Term
The use of mathematical operations to protect messages traveling between parties or stored on a computer.
Definition
Cryptography
Term
A specific mathematical process used in encryption and decryption.
Definition
Cipher
Term
Relying on secrecy, or an attacker's inability to obtain information about the cipher, rather than the robustness of the cipher itself is ____.
Definition
Security through obscurity
Term
____ is the person the supplicant claims to be.
Definition
True party
Term
What are the capabilities of RC4
Definition
40 or more bits
very weak key strength
Low RAM requirements
Can use variable key length
Term
What are the capabilities of DES
Definition
56 bit Key
Weak key strength
Moderate RAM and proccessing requirements
Term
What are the capabilities of 3DES
Definition
112 or 168 bit Key
Strong key strength
High processing requirements
Moderate RAM requirements
Term
What are the capabilities of 3DES
Definition
128, 192 or 256 bit Key
Strong key strength
low processing requirements
Low RAM requirements
Term
the DES key is ___ bits long. It comes in a bock of ___, of which ___ bits represents the key. the other 8 bits are redundant.
Definition
56
64
56
Term
When two parties begin to communicate via a cryptographic they go through 3 handshaking stages.

Stage 1 ___.
Stage 2 ___.
Stage 3 ___.
Definition
1. Initial negotiation of security parameters
2. initial authentication (usually mutual)
3. Keying (secure exchange of keys and other secrets)
Term
Cryptographic methods of ongoing communications.
1. Sender sends a(n) ___ to each message. This allows ___.
2. A good electronic signature provides ___.
3. The sender encrypts the combined message and electronic signature for ___.
Definition
1. Electronic Signature
The receiver to authenticate each message.
2. Message integrity
3. Confidentiality
Term
To get a party's public key from a trusted source, you get it from a ___.
Definition
Certificate Authority.
Term
A ___ is a(n) independent and trusted source of information about the public keys of true parties.
Definition
Certificate authority.
Term
A ___ contains a number of fields. Most importantly it contains the ___ in the subject field, and the ___ in the Public Key field.
Definition
1. Digital Certificate
2. Name of the true party
3. True party's public key
Term
What are the fields of a digital certificate?
Definition
Version number
Issuer serial number
Subject
Public Key
Public Key algorithm
Valid period
Digital Signature
Signature algorithm
Identifier
Other fields.
Term
What goes into testing a digital certificate?
Definition
1. Test the digital signature.
It has it's own digital signature
Signed with the CA's private key
Tested with the CA's public key
Check the valid period
Check for revocation
Term
To check for a revoked certificate, a verifier can do the following.
Definition
Download the certification revocation list.
Check the Online Certificate Status Protocol.
Term
HMAC stands for ___
Definition
Key-Hashed message Authentication Codes
Term
What does HMAC do?
Definition
The sender adds the key to each outgoing message then hashes the combined message and key.

The recipient decrypts it and tests the HMAC. The computed HMAC should match the transmitted one.
Term
___ means the sender can't send an important message and later claim that they didn't send it. This is used through ___.
Definition
Nonrepudiation
electronic signatures
Term
___ occurs when an attacker intercepts an encrypted message and transmits it later. This works even if the message is encrypted for ___ and the attacker can't read it.
Definition
Replay attack
Confidentiality
Term
TO ensure freshness of a message, you can include a ___
Definition
Time stamp
Term
___ is a randomly generated number attached to a message to deny a replay attack. The same generated number is never used twice.
Definition
Nonce
Term
___ delivers enormously long keys to communication partners.
This is a ___ use key.
Definition
Quantum Key distribution
one time
Term
Quantum key distribution creates a ___ that is as long as the entire message.
Definition
One-time key
Term
___ can be used to crack keys quickly by trying dozens, hundreds or thousands of keys at once.
Definition
quantum key cracking
Term
___ combine all of the cryptographic protections, including confidentiality, authentication and integrity into a single system
Definition
Cryptographic systems
Term
___ is created by using a cryptographic system to secure communication over an untrusted network.
Definition
Virtual Private Network (VPN)
Term
___ connects a single client over an untrusted network to a single server. This gives you access to a ___ computer
Definition
Host to host VPN
single
Term
___ connects a single remote PC over an untrusted network to a site network.
Definition
Remote access VPN
Term
Remote access users connect to a ___ which authenticates them and gives them access to authorized resources within the site. This gateway gives remote users access to ___ computers within the site.
Definition
VPN gateway
multiple
Term
___ protects all traffic flowing over an untrusted network between a pair of sites.
Definition
site to site VPN
Term
Site to Site VPNs connections cryptographically protects teh traffic of ___ simultaneous conversation(s) taking place between various computers in the sites.
Definition
many/several
Term
What is the VPN standard for now?
Definition
SSL/TLS
Term
SSL/TLS is the cryptographic standard for ___ VPNs and ___ VPNs
Definition
Host to Host
Remote Access
Term
Because SSL/TLS works at the ___ layer, it can protect application layer traffic encapsulated in the ___ messages.
Definition
Transport
transport layer
Term
SSL/TLSs protection of the application layer messages is not ___, which means it doesn't ___ protect all higher-layer messages. It only protects applications that are ___.
Definition
transparent
automatically
SSL/TLS-aware
Term
To convert SSl/TLS from a host to host VPN to a remote access VPN, firms place a(n) ___ at the border of each site.
Then the remote client's browser establishes a(n) ___ connection rather than with the individual hosts within the site.
Definition
SSL/TLS gateway
Single SSL/TLS
Term
How many SSL/TLS gateway standards are there?
Why?
Definition
None
SSL/TLS governs the link between the client and the SSL/TLS gateway
Term
A SSL/TLS gateay is simply a ___ as far as SSL/TLS is concerned
Definition
webserver
Term
what are the common features of SSL/TLS gateways?
Definition
Authentication: the gateway authenticates itself to the client via public key authentication
Connection the client PC to authorized resources.
Term
VPN gateways ___ messages for browsers to present to users.
Definition
Webifies
Term
There may or may not be security between the SSL/TLS gateway and resources ___ the network.
Definition
Within
Term
PGP stands for what? What is it used for?
Definition
Pretty good privacy
Send encrypted emails that governments cant decrypt.
Term
SRTP states for what? How is it used?
Definition
Secure Real-time Transport Protocol.
It uses negotiated keys to encrypt VoIP calls.
Term
What is the strongest VPN security?
Definition
IPsec
Term
IPsec operates at the ___ layer and protects the ___ data field.
Definition
Internet
IP packet
Term
Does IPsec increase or decrease implementation cost? How?
Definition
Decrease by reducing workarounds. However, IPsec is more costly and complex overall to install.
Term
___ gives host-to-host security.
Definition
IPsec Transport Mode
Term
Transport mode (in regards to IPsec) is attractive because it provides security when packets travel over ___ networks as well as across ___.
Definition
Internal
the Internet
Term
On the negative side, transport mode IPsec requires forms to set up IPsec explicitly on ___ and ___
Definition
Client
Server
Term
___ only protects traffic between two IPsecgateways at different sites. This creates a site to site VPN.
Definition
IPsec tunnel mode
Term
The major advantage of IPsec Tunnel mode operation is ___. All of the cryptographic work is done on the IPsec ___ servers.
In addition, IPsec Tunnel mode is ___ friendly. How?
Definition
Cost
gateway
firewall. Packets are only encrypted between the two IPsec gateways. After a packet arrives it can be filtered by the firewall
Term
What is the main disadvantage of IPsec Tunnel Mode?
Definition
It gives no protection at all to IP packets when they are traveling WITHIN the site networks at the two sites
Term
___ is an agreement about what IPsec security methods and operations two hosts or two IPsec gateways will use.
Definition
Security Association (SA)
Term
When two parties communicate, they must establish ___ SA's.
Definition
Two. One in each direction.
Term
SSL/TLS has no way to set and enforce policies centrally, but ___ does.
Definition
IPsec
Term
IPsec supports the use of ___, which pushes a list of suitable policies to individual IPsec gateway servers or hosts.
Definition
IPsec policy servers
Supporting users have an ad free experience!