Shared Flashcard Set

Details

CCNAS_Chpt7_CryptographicSystems
CCNAS_Chpt 7_CryptographicSystems
24
Computer Networking
Undergraduate 3
03/27/2011

Additional Computer Networking Flashcards

 


 

Cards

Term
Confidentiality
Definition
If the message is captured it cannot be deciphered
Term
Integrity
Definition
Guarantees that the message has not been altered
Term
Authenticity
Definition
The message is not a forgery and does actually come from whom it says
Term
Brute-force
Definition
Attacker tries every possible key with the decryption algorithm
Term
Cyphertext only
Definition
attacker has the ciphertext of several messages all using the same encryption algorithm
Term
known plaintext
Definition
attacker has access to the ciphertext of several messages, but also knows something about the plaintext underlying that ciphertext
Term
Chosen Plaintext
Definition
attacker chooses which data the encryption device encrypts and observes the ciphertext output
Term
meet in the middle
Definition
a known plaintext attack in which the attacker knows a portion of hte plaintext and the corresponding ciphertext
Term
Chosen ciphertext
Definition
attacker can choose ifferent ciphertext to be decrypted and has access to the decrypted plaintext
Term
Key generation
Definition
In a modern cryptographic system, key generation is usually automated and not left ot users
Term
Key Verification
Definition
Almost all cryptographic algorithms have some weak keys that should not be used
Term
Key Storage
Definition
If a Trojan Horse program were installed on the PC an attacker could then have access to the private keys
Term
Key Exchange
Definition
Key mgmt procedures should provide a secure key exchange mechanism
Term
Key Revocation and Destruction
Definition
Notifies all interested parties tha a certain key has been compromised and should no longer be used. Erases old keys in amanner that prevents malicious attackers from recovering them
Term
symmetric keys
Definition
Exchanged between two routers supporting a VPN
The key to encrypt and decrypt are the same
Term
Assymetric keys
Definition
The key to encrypts and decrypt are different, but related
Used in secure HTTPS applications
Term
Digital Signatures
Definition
Widely used for code signing
Term
hash keys
Definition
Used in symmetric and assymmetric key generation, digital signatures and other types of applications
Term
Types of Hashes
Definition
SHA
MD5
Term
Types of symmetrical encryption
Definition
3DES
AES
Blowfish
DES
Term
asymmetrical encryption
Definition
DH
RSA
Term
My private key
Definition
I want you to be sure the information came only from me
Term
Your public key
Definition
I want to be sure that you are the only person who can read the file
Term
Non-repudiation
Definition
I cannot deny the file came from me
Supporting users have an ad free experience!