Shared Flashcard Set

Details

Chapter 6 Cryptography
CISSP Training
23
Computer Science
Advanced
10/30/2015

Additional Computer Science Flashcards

 


 

Cards

Term
Digital Signature
Definition
Hash value that has been encrypted with the senders private key. Ensures AUTHENTICITY and INTEGRITY of message.
Term
A message that is encrypted provides what level of security services?
Definition
Confidentiality
Term
A message that is hased provides what level of security services?
Definition
Integrity
Term
A message that is digitally signed provides what level of security services?
Definition
Authentication, Nonrepudiation and Integrity
Term
A message that is encrypted and digitally signed provides what level of security services?
Definition
Confindentiality, Authentication, Nonrepudiation and Integrity
Term
Asymmetric Key Alogorithms
Definition
RSA: Encrypt, Digital Sign & Key Distr
ECC: Encrypt, Digital Sign & Key Distr
Diffe-Hellman: Key Distro
El Gamal: Encrypt, D Sign & Key Distr
DSA: Digital Signature
Knapsack: Encrypt, D Sign & Key Distr
Term
Symmetric Key Alogorithms
Definition
DES: Encryption
3DES: Encryption
Blowfish: Encryption
IDEA: Encryption
RC4: Encryption
SAFER: Encryption
Term
Hashing Algorithms
Definition
MD2: Hashing Functions
MD4: Hashing Functions
MD5: Hashing Functions
SHA Family: Hashing Functions
HAVAL: Hashing Functions
TIGER: Hashing Functions
Term
Digital Signature Standard - DSS
Definition
Developed in 1991 by NIST, RSA and DSA are best know and most widley used digital signature algorithms
Term
Diffie-Hellman Algorithm
Definition
First asymmetric alogorithm created and is used to exchange key values
Term
RSA Alogorithm
Definition
De facto asymmetric algorithm used for encryption, digital signatures and key exchange
Term
El Gamal algorithm
Definition
Aysmmetric algorithm based upon the Diffie-Hellman algorithm used for encryption, digital signatures and key exchange
Term
Ellipic curve cryptosystem alogorithm
Definition
Asymmetric alogorithm bsed on the algebraic structure of elicpic curves over finite curves. Used for encryption, digital signatures and key exchange
Term
Knapsack algorithm
Definition
Aysmmetric algorithm based upon a subset sum problem (knapsack problem) It has been broken and is NO LONGER USED
Term
Zero Knowledge Proof
Definition
One entity can prove something to be true without providing a secrect value
Term
One-Way Hash
Definition
Cryptogrpahic process that takes an aribtrary amount of data and generates a fixed length value. Used for INTEGRITY protection
Term
Message Authentication Code (MAC)
Definition
Keyd cryptographic hash function used for data INTEGRITY and data origin AUTHENTICATION.
Term
Hased Message Authentication Code (HMAC)
Definition
Cryptographic hash function that uses a symmetrick key value and is used for data INTEGRITY and data origin AUTHENTICATION.
Term
CBC-MAC = Cipher Block Chaining
Definition
Cipher block chaining message authentication code uses encryption for data INTEGRITY and data origin AUTHENTICATION
Term
CMAC - Cipher-Based Message Authentication Code
Definition
Cipher message authentication code that is based upon and provides more security compared to CBC-MAC.
Term
CCM
Definition
Block cipher mode that combines the CTR encryption mode and CBC-MAC. One encryption key is used for both authentication and encryption purposes
Term
Collison
Definition
When two different messages are computed by the same hashing algorithm and the same message digest value results.
Term
Public Key Infrastructure (PKI)
Definition
Provides:
Confidentiality
Access Control
Integrity
Authentication
Nonrepudiation
Supporting users have an ad free experience!