Shared Flashcard Set

Details

CISSP - Cryptograhy
Crypto Domain Study Cards
46
Computer Science
Professional
06/29/2008

Additional Computer Science Flashcards

 


 

Cards

Term
Cryptography
Definition
science of codes
Term
Cryptanalysis
Definition
science of breaking codes
Term
work factor
Definition
estimate of time needed to break a protective measure
Term
Link encryption
Definition
individual application of encryption to data on each link of a
network
Term
End-to-end encryption
Definition
encryption of data from source system to end system
Term
Block code cipher
Definition
each block encrypted
separately
DES is block cipher
Term
Stream cipher
Definition
message broken into characters or bits and enciphered with a key
stream
XOR generally used
Term
key exchange, negotiation, or
distribution
Definition
Process of establishing a session key
Term
Symmetric Key
Definition
private key/secret key
1. Single key shared by sender and receiver
Strengths: 1,000 or more times faster than asymmetric
4. Weaknesses: key management is a weakness – requires secure key
distribution
Term
Asymmetric Key Cryptography
Definition
public key
Message encrypted with one of keys can be decrypted with other — two key
pairs – private key (kept secret) and public key (made available)
2. Based on difficult to solve problems – factoring the product of two large primes
or discrete logarithm problem
Strengths: efficient key distribution, scalable, provides confidentiality, access
control, authentication, integrity, and non-repudiation services
6. Weaknesses: very intense computations, slower than symmetric
Term
Hybrid Systems
Definition
Symmetric key for bulk data encryption
2. Asymmetric key for key distribution
Term
Substitution cipher
Definition
shift alphabet or scramble alphabet and substituting
characters
Term
Transposition cipher
Definition
position of letters is permuted
Term
Polyalphabetic cipher
Definition
use multiple substitution ciphers with different
alphabets to defeat frequency analysis
Term
Running key cipher
Definition
uses text from a source, such as a book, to encrypt
the plaintext – key is known to sender and receiver – page, line, and character
number
Term
One time pad
Definition
key is a random set of non-repeating characters and each key bit is used only once — each key bit is XORed with message bit to produce ciphertext
Term
Concealment cipher
Definition
message is hidden in another message – every so
many words for example
Term
Steganography
Definition
data hidden in picture files (least significant bits of bitmap
image), sound files, slack space on disks
Term
Codes
Definition
list of codes or phrases and their corresponding code group
Term
Types of Machines
Definition
Hagelin machine (combines plaintext with key stream to produce ciphertext), rotor machine uses rotors to produce cipher alphabet (Japan’s Purple and Germany’s Enigma)
Term
DES
Definition
block cipher — symmetric key — 56 bit key, plus 8 parity bits — 16
rounds of transpositions and substitutions
Term
DES - ECB
Definition
Electronic Code Book (ECB) — 64-bit data blocks processed at one time — same message and key produce same ciphertext
Term
DES - CBC
Definition
Cipher Block Chaining (CBC) — first 64-bit plaintext block XORed with an initializing vector and processed with key to produce ciphertext which is then XORed with second 64-bit plaintext block to produce second ciphertext block
Term
DES - CFB
Definition
Cipher Feedback (CFB) — first 64-bit plaintext block is XORed with the key-ciphered initialization vector to produce the ciphertext – this ciphertext is encrypted with key and XORed with second 64-bit plaintext block to product second ciphertext block
Term
DES - OFB
Definition
Output Feedback (OFB) — similar to CFB except the XORed bits are not a function of either the plaintext of the ciphertext – initialization vector is used to seed the process – IV is DES encrypted and XORed with first data block to produce first ciphertext – the DES encrypted IV is DES encrypted again for the second block
Term
Double DES
Definition
block cipher — symmetric key — 112 bit key — no more secure
than DES
Term
Triple DES
Definition
block cipher — symmetric key — 168 bit key — different modes:
a. 3 DES encryptions with 3 different keys
b. Encrypt – decrypt – encrypt with three different keys
Term
International Data Encryption Algorithm (IDEA)
Definition
block cipher — symmetric
— 128-bit key — 8 rounds of transpositions and substitutions — three
mathematical functions: XOR, Addition mod 65536, and Multiplication mod
65537
Term
Rivest Cipher 5 (RC5)
Definition
variable block size — symmetric — variable key size
— data dependent rotations — variable number of rounds — primarily
software implementation
Term
Advanced Encryption Standard (AES)
Definition
Rijndael Block Cipher — symmetric
— variable block and key length (128, 192, 256)
Term
Public Key Cryptography
Definition
Uses one-way hash function for message integrity, time date stamp
b. Uses mathematical function that is easier to compute in one direction
than in the opposite direction
c. Trap Door One-Way Function
Term
Secure Message
Definition
w/asymmetric crypto, sender encodes message with
receiver’s public key and receiver decodes with private key — confidentiality
Term
Open Message
Definition
w/asymmetric crypto, sender encodes message with
sender’s private key and receiver decodes with sender’s public key —
authentication and non-repudiation
Term
Secure and Signed Message
Definition
w/asymmetric crypto, sender encodes
message with own private key, sender re-encodes message with receiver’s
public key and receiver decodes with own private key and decodes again with
sender’s public key — authentication, non-repudiation, and confidentiality
Term
RSA: (Rivest, Shamir, and Adleman)
Definition
asymmetric — factoring large prime
integers — services: encryption, key distribution of symmetric keys, and digital
signatures — 512-bit and 768-bit keys are weak, but 1024-bit key is
moderately secure
Term
Elliptical Curve Cryptosystem (ECC)
Definition
asymmetric — based on
mathematical problem of factors that are coordinate pairs that fall on an
elliptical curve — services: encryption, key distribution of symmetric keys, and
digital signatures — highest strength per bit of public key systems
Term
Diffie-Hellman
Definition
first public key algorithm — patent expired in 1997 — key
exchange algorithm
Term
El Gamal
Definition
asymmetric — based on difficulty in calculating discrete logarithms
in a finite field — services: encryption and digital signatures
Term
Merkle-Hellman Knapsack
Definition
asymmetric — based on subset of sum problem
in combinatorics — has been broken
Q. Time stamps can be used to prevent replay attacks
R. Elliptic curve – best bandwidth, computation, and storage — Wireless
S. Key escrow: Clipper chip with Skipjack algorithm (80 bit key, 64 bit block) — Key
split in two and held by to escrows
Term
Digital Signature
Definition
used to detect unauthorized modifications and authenticate
sender — provides non-repudiation — private key signs and public key verifies —
used to authenticate software, data images, users, machines
Steps:
1. Compute message digest
2. Digest is fed into digital signature algorithm with sender’s private key to
generate digital signature
3. Message and attached digital signature sent to recipient
Term
Digital Signature Algorithm (DSA)
Definition
Digital Signature Standard (DSS) — uses
secure hash algorithm (SHA-1) and condenses message to 160 bits — Key size 512
to 1024
Term
Hash Function
Definition
1. Condenses arbitrary length messages to fixed length – usually for subsequent
signing by a digital signature algorithm
2. Output is message digest, Two files cannot have same hash, Can’t create file
from hash

3. MD5 – 128 bit digest of input message, uses blocks of 512, 4 rounds of
transformation
4. SHA-1 (by NIST) — SHA-256, SHA-384, SHA-512 supports AES — HAVAL
5. HMAC — hashed MAC more secure and more rapid message digest
Term
Message Authentication Code (MAC)
Definition
used when sender only wants one person
to be able to view the hash value – the value is encrypted with a symmetric key —
similar to a CRC — weak form of authentication
X. Clustering: plaintext message generates identical ciphertext using the same
transformation algorithm, but with different keys (cryptovariables)
Term
Certificate Authority (CA)
Definition
binds public key to person — Certificate revocation list
— X.509 provides format for digital certificates
Term
Privacy Enhanced E-mail (PEM)
Definition
Proposed by IETF to comply with Public Key
Cryptography Standards (PKCS) developed by Microsoft, Novell and Sun — Uses
MD2/MD5 for message digest, DES-CBC or triple DES-EDE for text encryption and
RSA for digital signature and key distribution — certificates based on X.509
1. Privacy, message integrity, authentication and non-repudiation
Term
Pretty Good Privacy (PGP)
Definition
1. Privacy, integrity, identification authentication, and policy enforcement
2. Symmetric encryption — 3DES, DES, IDEA
3. RSA, DSS, and Diffie-Hellman for the symmetric key exchange
4. SHA-1 and MD5 for hashing
5. Web of trust instead of CA
BB. Attacks on Symmetric Block Ciphers
1. Differential Cryptanalysis — private key cryptography — looks at ciphertext
pairs with specific differences and analyzes the effects of these differences
2. Linear Cryptanalysis — uses known plaintext and corresponding ciphertext to
generate a linear approximation of a portion of the key
3. Differential Linear Cryptanalysis — combination of both
4. Algebraic Attacks — relies on block ciphers displaying high degree of
mathematical structure
Supporting users have an ad free experience!