Shared Flashcard Set

Details

CISSP: Cryptography Domain
CISSP
64
Computer Science
Professional
07/15/2012

Additional Computer Science Flashcards

 


 

Cards

Term
What two areas does Cryptology cover?
Definition
Cryptanalysis and Cryptography
Term
What is another name for a key in Cryptography?
Definition
Cryptovariable
Term
What do we call the maximum number of keys available in cryptography?
Definition
Keyspace
Term
Adding additional material to the plaintext message before it is encrypted to assist with encryption is known as __________?
Definition
Padding
Term
______________ is a term used to represent a weakness that would exist in a cryptosystem if two keys would generate the same cyphertext from the same plaintext.
Definition
Key Clustering
Term
The _________ is a random value that is XOR'd with the plaintext message before encryption.
Definition
Initialization Vector
Term
_______________ is an estimate of the effort/time needed to overcome a protective measure by an attacker with specified expertise and resources.
Definition
Work Factor
Term
____________ States that the strength of a cryptosystem is based on the secrecy of the key and not the secrecy of the algorithm.
Definition
Kerckhoff's Principle
Term
________________ Use the same key for encryption and decryption.
Definition
Symmetric Key Algorithms
Term
________________ Use different keys for encryption and decryption.
Definition
Asymmetric key algorithms
Term
What is Quantum Cryptography?
Definition
Using single-photon light emissions to provide secure key negotiation
Term
What is a major disadvantage of Link Encryption?
Definition
Since the address information is encrypted, the entire message must be decrypted several times in transit
Term
What two concepts did Claude Shannon describe when writing his Communication Theory of Secrecy Systems?
Definition
Confusion and Diffusion
Term
How does Claude Shannon define confusion?
Definition
The principle of hiding patterns in the plaintext by means of substitution
Term
How does Claude Shannon define Diffusion?
Definition
The property of transposing the input plaintext through the ciphertext so that a character in the ciphertext will not directly line up with the corresponding plaintext character
Term
What is the practice of hiding one piece of information inside of another?
Definition
Steganography
Term
What type of encryption is typically used for encrypting small independent blocks of information?
Definition
Electronic Code Book
Term
What type of encryption does SSH use?
Definition
Cipher Block Chaining
Term
What two values must be shared in Cipher Block Chaining?
Definition
The Initialization Vector as well as the key
Term
What type of encryption is similar to CBC, but is used to encrypt streaming communications?
Definition
Cipher Feed Back
Term
What is the risk in using a Counter?
Definition
If the counter repeats itself it offers little more than ECB provides.
Term
What is the true key size of DES?
Definition
56 bit
Term
What does AES stand for?
Definition
Advanced Encryption Standard
Term
What Block sizes are available with AES?
Definition
128, 192, and 256
Term
AES is is unique in that it has a variable number of __________.
Definition
Rounds
Term
Which ciphers were created by Ron Rivest?
Definition
RC2, RC4, RC5, and RC6
Term
Which Ron Rivest Cipher is a stream cypher?
Definition
RC4
Term
The ability to encrypt something with a widely available public key and only decrypt with a secret private key is known as what type of encryption?
Definition
Asymmetric Key Cryptography
Term
What do Public Key Algorithms ensure?
Definition
Confidentiality and Proof of Origin
Term
___________ Allows two entities to negotiate a session key that can be used to exchange secret information, without ever revealing their private keys.
Definition
Diffie-Hellman
Term
What do Message Integrity Controls detect?
Definition
Alterations
Term
What do hashing functions detect?
Definition
Accidental Changes
Term
_________ is used to authenticate a message by using a secret key as an input with which to produce a tag?
Definition
Message Authentication Code
Term
What two things do digital signature guarantee?
Definition
Non-repudiation of Origin and Integrity of Message
Term
__________ Specifies the standard layout for public key certificates and certificate revocation lists.
Definition
X.509 Standard
Term
The _____________ is an agreement between several countries that governs the movement of cryptographic algorithms between those countries.
Definition
Wassenaar Agreement
Term
What do certificates do?
Definition
Bind a public key to its owner
Term
_________ act as a trusted third party to validate the owners of public keys.
Definition
Certificate Authorities
Term
___________ trust models operate because the entities trust enough people in common to make it unreasonable for everyone to be subverted.
Definition
Web of Trust
Term
__________ Trust models operate in a manner which each entity puts its trust in a parent organization, checking higher and higher levels until there is a common organization, then working back down to the levels to the destination entity.
Definition
Hierarchical Trust
Term
_______ is the art and science of breaking codes.
Definition
Cryptanalysis
Term
What three things should be considered in order to protect keys from being discovered through cryptanalysis?
Definition
1. The algorithm must be functionally complex.
2. The relationship between key and keystream should not be easy to determine.
3. The keystream generation should be statistically unpredictable
Term
What are the two factors determine the feasibility of a Brute Force attack?
Definition
Processing and Time
Term
What are the two components of Moore's Law?
Definition
1. Processing Speed doubles every 18 months at the same price.
2. Advances in technology and computing performance will always make brute force an increasingly practical attack on keys of a fixed length.
Term
In a _________________ attack, the attacker has both the plain text and the cipher text and uses them to try to determine the key or cryptovariable used in the encryption process.
Definition
Known Plaintext
Term
________________ attacks are particularly relevant in the case of asymmetric key cryptography where the attacker has the ability to encrypt any desired plaintext using the public key.
Definition
Chosen Plaintext Attack
Term
In a ____________ attack, the attacker has access to the encrypted text but may not know the system that was used to generate it.
Definition
Ciphertext only attack
Term
In a _____________ attack, the attacker has access to ciphertext and the system used to generate it.
Definition
Chosen ciphertext attack
Term
A _______ attack hashes common words or password combinations to obtain a collision.
Definition
Dictionary
Term
In which type of cryptanalytic attack is a cryptosystem's work factor MOST relevant?
Definition
Brute Force Attacks
Term
Which algorithm created by Ron Rivest is used for stream ciphers?
Definition
RC4
Term
WEP and WPA use which cipher?
Definition
RC4
Term
______________ is the process of hiding information in photos, music, and videos in such a way as to make the alteration invisible to casual observers.
Definition
Steganography
Term
___________ is used commonly to help two parties agree on a session key without exchanging secret information.
Definition
Diffie-Hellman
Term
_____________ combine a hash function with a shared symmetrical key.
Definition
Keyed Hashes
Term
_____________combine a hash function with an asymmetric key.
Definition
Digital Signatures
Term
What is the MOST significant advantage that AES offers over DES?
Definition
Larger key space
Term
For what application is Electronic Code Book most acceptable?
Definition
Encrypting Small files
Term
What is the best way to verify that a digital signature is valid?
Definition
Obtain a public key certificate and verify the digital signature using that key
Term
Two different input values that result in the same message digest value is known as a _______________.
Definition
Collision
Term
What would likely be the first step in the establishment of an encrypted session using hybrid encryption systems such as SSL or IPSec?
Definition
Exchange of public keys
Term
___________ provides the ability to verify the authenticity of public keys.
Definition
Certification
Term
When should a CA place a certificate on a CRL?
Definition
When the private key of the certificate owner has been compromised.
Term
What is the best way to verify the person who initiated a transaction?
Definition
Have the person encrypt the hash with his or her private key
Supporting users have an ad free experience!