Term
| Public encrypts; private decrypts in what encryption type? |
|
Definition
|
|
Term
| Function which creates a signature of a file. Helps in proving integrity. |
|
Definition
|
|
Term
| Study of protecting information, whether in transit or at rest. |
|
Definition
|
|
Term
|
Definition
|
|
Term
| In cryptography, the term for encrypted data |
|
Definition
|
|
Term
| Rendering sender unable to deny they sent something. |
|
Definition
|
|
Term
| Cipher method in which bits are encyrpted one bit at a time. |
|
Definition
|
|
Term
| Encrypted in sets of data, usually 64 bits at a time |
|
Definition
|
|
Term
| Substitution and transposition are algorithms used in which encryption method. |
|
Definition
|
|
Term
| Primary algorithm used in stream cipher. |
|
Definition
|
|
Term
| Speed is a benefit of which encryption method. |
|
Definition
|
|
Term
|
Definition
| If the key is smaller than the data, successful cryptanalysis is possible via frequency attack |
|
|
Term
| De Facto encryption standard |
|
Definition
|
|
Term
| multiplies two prime numbers. |
|
Definition
|
|
Term
|
Definition
|
|
Term
| Used for encryption and digital signatures |
|
Definition
|
|
Term
|
Definition
| Repository for government encryption access when there are legal issues, such as subpoenas |
|
|
Term
| Asymmetric encryption disadvantage |
|
Definition
| Requires large encryption keys. |
|
|
Term
|
Definition
|
|
Term
|
Definition
|
|
Term
|
Definition
|
|
Term
|
Definition
|
|
Term
|
Definition
|
|
Term
| Symmetric Encryption AKA (4) |
|
Definition
| Single / secret / shared / private |
|
|
Term
| Symmetric Encryption drawbacks (2) |
|
Definition
| Key sharing is complicated / Scalability |
|
|
Term
| Typical data block size of symmetric key encryption |
|
Definition
|
|
Term
| Encryption method which replaces character with another character, or bit with another bit. |
|
Definition
|
|
Term
|
Definition
|
|
Term
| Diffie-Hellman encryption type |
|
Definition
|
|
Term
| Diffie-Hellman used in which two protocols |
|
Definition
| Encryption used in IPSEC and SSL protocols |
|
|
Term
| Diffie-Hellman vulnerable to... |
|
Definition
| Vulnerable to man-in-the-middle attacks (MITM) when digital signature use is waived |
|
|
Term
|
Definition
| Elliptic Curve Cryptosystem |
|
|
Term
| Elliptic Curve Cryptosystem (ECC)used on what devices? |
|
Definition
| Encryption method used by mobile devices |
|
|
Term
| Elliptic Curve Cryptosystem (ECC) benefit |
|
Definition
| Uses less computational power |
|
|
Term
| El Gamal (difference from RSA) |
|
Definition
| Encryption method not based on prime number factoring |
|
|
Term
|
Definition
| Uses discrete logarithm problems for encryption and digital signatures |
|
|
Term
| First government accepted digital signature scheme |
|
Definition
|
|
Term
| First government accepted digital signature scheme; it meets Digital Signature Standard (DSS), one of the Federal Information Processing Standards (FIPS) |
|
Definition
|
|
Term
| Hash function(definition) |
|
Definition
| Any algorithm that maps data of variable length to data of a fixed length |
|
|
Term
| Results of hashing function (5 synonyms) |
|
Definition
| hashes, hash values, hash codes, hash sums, checksums |
|
|
Term
| Used to crack a hash algorithm |
|
Definition
|
|
Term
| Collision (hash, definition) |
|
Definition
| When 2 or more files create the same output from a hash function |
|
|
Term
|
Definition
| Public Key Infrastructure |
|
|
Term
|
Definition
|
|
Term
|
Definition
|
|
Term
|
Definition
| Web of Trust / Single authority System / Hierarchical Trust System |
|
|
Term
|
Definition
| User trust certificates they have exchanged with another person, and further they trust everyone who the other person trusts and so on |
|
|
Term
|
Definition
| There is one entity which holds all certificates-the Certificate Authority |
|
|
Term
| Hierarchical Trust System |
|
Definition
| There is a certificate authority at the top and then all the entities below it which are trusted by the certificate authority to do their job on their behalf |
|
|
Term
| Fields in a digital certificate (8) |
|
Definition
| Public key, Serial Number, Subject/Algorithm, Issuer, Valid From date, Valid To date, Key Usage (purpose of use), optional fields |
|
|
Term
| Current PKI world standard version number |
|
Definition
|
|
Term
| key size is deemed by the US government as uncrackable |
|
Definition
|
|
Term
| Avenues of encrypted communications |
|
Definition
| (SSIP) Secure shell (SSH) / Secure Socket Layer (SSL) / Internet Protocol Security (IPSec) / Point-to-point tunneling Protocol (PPTP) |
|
|
Term
| Two things to ensure your encryption is effectively uncrackable |
|
Definition
| Use a large key, Change the key on a regular basis |
|
|
Term
| Encryption algorithms turn what into what? |
|
Definition
| Plaintext into ciphertext |
|
|
Term
| When both parties cannot deny the message was sent /received |
|
Definition
|
|
Term
| Encryption method which cannot be broken if the message is truly random, used only once and has no repeating patterns |
|
Definition
|
|
Term
| Name three problems which symmetric encryption algorithms have that asymmetric encryption algorithms do not |
|
Definition
| Scalability issue / key exchange issue / lack of non-repudiation |
|
|