Shared Flashcard Set

Details

CISSP Cryptography
Cryptography Terms
18
Computer Science
Professional
03/12/2011

Additional Computer Science Flashcards

 


 

Cards

Term
What is used to protect against fraud in electronic fund transfers (EFT)?
Definition

 Message Authentication Code (MAC), ANSI X9.9.

The MAC is a check value, Cyclic Redundancy Check (CRC), which is derived from the contents of the message itself, that is sensitive to the bit changes in a message.

Term
In Rijndael, both block length and key length can be extended very easily to multiples of ____ bits.
Definition
Both block length and key length can be extended very easily to multiples of 32 bits.
Term
MD5 specifications:
- algorithm type
- # of bits
- rounds
Definition
MD5 specifications (RFC1312)

- one-way has hash
- 128 bits
- 4 rounds
Term

The three Rinjdael transformations are:

 

Definition

The three Rinjdael transformations are:

The non-linear layer,
the linear mixing layer

the key addition layer

Term

Rijndael rounds for 128 bits key/block size  ___

Rijndael rounds for 192 bits key/block size ___

Rijndael rounds for 256 bits key/block size ___

 

Definition

10 rounds if the key/block size is 128 bits

12 rounds if the key/block size is 192 bits

14 rounds if the key/block size is 256 bits

Term

Wireless Application Protocol (WAP) protocol

is a specification for a set of communication protocols to standardize Internet access, including e-mail, the World Wide Web, newsgroups, and instant messaging for wireless devices, such as cellular telephones and radio transceivers, can be used

 WAP1 stack include:

Definition

The Wireless Markup Language (WML) and script and

 

 

 

 Wireless Session Protocol (WSP) Session Layer

(HTTP/1.1)

 

 

 

 

  Wireless Transaction Protocol (WTP) connection-mode, reliable similar to TCP

 

 

 

Wireless Datagram Protocol (WDP) - UDP

 

 

 

 

 

 

 

 

 

  

 

Wireless Application Environment (WAE) (App. Layer)

XHTMLMP for WAP 2.0

Term

Key recovery technique for storing knowledge of a cryptographic key by encrypting it with another key and ensuring that that only certain third parties can perform the decryption operation to retrieve the stored key:

 

Definition
Key encapsulation
Term

Web Programming Model,  Pull Model

Definition

Client requests content from the server

(Request/Resopnse)

Term

Programming Model, Push Model

Definition

Server can proactively send content to the client

Term

PKCS #7: Cryptographic Message Syntax

Request for Comments: 2315

Definition

digital signatures  

 

digital envelopes - hybryd encryption scheme first encrypting the data using a symmetric encryption algorithm and a secret key, and then encrypting the secret key using an asymmetric encryption algorithm and the public key of the intended recipient

Term
Key sequence of DES
Definition

Sequence of 8 Bytes = 64 bits.

Each Bytes has 8 bits (seven key bits and a parity bit)  => 56 bit key and 8 bit parity.

Term

Key agreement scheme with implicit signatures 

Definition

MQV (Menezes–Qu–Vanstone) is an authenticated protocol for key agreement based on the Diffie–Hellman scheme. MQV provides protection against an active attacker. The protocol can be modified to work in an arbitrary finite group, in  elliptic curve groups, where it is known as elliptic curve MQV (ECMQV).

Both parties in the exchange calculate an implicit signature using its own private key and the other's public key
Term
RFC2828
Definition
Internet Security Glossary
Term
Known-plaintext attack ( crib )
Definition
Cryptanalysis technique to determine the key from knowledge of some plaintext-ciphertext pairs
Term
Chosen-plaintext attack
Definition
Cryptanalysis technique  to determine the key from knowledge of ciphertext that corresponds to certain plaintext selected (dictated) by the analyst.
Term
Chosen-ciphertext attack
Definition
Cryptanalysis technique to determine the key from knowledge of plaintext that corresponds to ciphertext selected (i.e., dictated) by the analyst.
Term
Known-ciphertext attack
Definition
Cryptanalysis technique  to determine the key from knowledge of some ciphertext.
Term
What cipher uses a key of the same length as the message
Definition
One-time pad (unbreakable)
Supporting users have an ad free experience!