# Shared Flashcard Set

## Details

Chapter 6 Cryptography
CISSP Training
23
Computer Science
10/30/2015

## Additional Computer Science Flashcards

Term
 Digital Signature
Definition
 Hash value that has been encrypted with the senders private key. Ensures AUTHENTICITY and INTEGRITY of message.
Term
 A message that is encrypted provides what level of security services?
Definition
 Confidentiality
Term
 A message that is hased provides what level of security services?
Definition
 Integrity
Term
 A message that is digitally signed provides what level of security services?
Definition
 Authentication, Nonrepudiation and Integrity
Term
 A message that is encrypted and digitally signed provides what level of security services?
Definition
 Confindentiality, Authentication, Nonrepudiation and Integrity
Term
 Asymmetric Key Alogorithms
Definition
 RSA: Encrypt, Digital Sign & Key DistrECC: Encrypt, Digital Sign & Key DistrDiffe-Hellman: Key DistroEl Gamal: Encrypt, D Sign & Key Distr DSA: Digital SignatureKnapsack: Encrypt, D Sign & Key Distr
Term
 Symmetric Key Alogorithms
Definition
 DES: Encryption3DES: EncryptionBlowfish: EncryptionIDEA: EncryptionRC4: EncryptionSAFER: Encryption
Term
 Hashing Algorithms
Definition
 MD2: Hashing FunctionsMD4: Hashing FunctionsMD5: Hashing FunctionsSHA Family: Hashing FunctionsHAVAL: Hashing FunctionsTIGER: Hashing Functions
Term
 Digital Signature Standard - DSS
Definition
 Developed in 1991 by NIST, RSA and DSA are best know and most widley used digital signature algorithms
Term
 Diffie-Hellman Algorithm
Definition
 First asymmetric alogorithm created and is used to exchange key values
Term
 RSA Alogorithm
Definition
 De facto asymmetric algorithm used for encryption, digital signatures and key exchange
Term
 El Gamal algorithm
Definition
 Aysmmetric algorithm based upon the Diffie-Hellman algorithm used for encryption, digital signatures and key exchange
Term
 Ellipic curve cryptosystem alogorithm
Definition
 Asymmetric alogorithm bsed on the algebraic structure of elicpic curves over finite curves. Used for encryption, digital signatures and key exchange
Term
 Knapsack algorithm
Definition
 Aysmmetric algorithm based upon a subset sum problem (knapsack problem) It has been broken and is NO LONGER USED
Term
 Zero Knowledge Proof
Definition
 One entity can prove something to be true without providing a secrect value
Term
 One-Way Hash
Definition
 Cryptogrpahic process that takes an aribtrary amount of data and generates a fixed length value. Used for INTEGRITY protection
Term
 Message Authentication Code (MAC)
Definition
 Keyd cryptographic hash function used for data INTEGRITY and data origin AUTHENTICATION.
Term
 Hased Message Authentication Code (HMAC)
Definition
 Cryptographic hash function that uses a symmetrick key value and is used for data INTEGRITY and data origin AUTHENTICATION.
Term
 CBC-MAC = Cipher Block Chaining
Definition
 Cipher block chaining message authentication code uses encryption for data INTEGRITY and data origin AUTHENTICATION
Term
 CMAC - Cipher-Based Message Authentication Code
Definition
 Cipher message authentication code that is based upon and provides more security compared to CBC-MAC.
Term
 CCM
Definition
 Block cipher mode that combines the CTR encryption mode and CBC-MAC. One encryption key is used for both authentication and encryption purposes
Term
 Collison
Definition
 When two different messages are computed by the same hashing algorithm and the same message digest value results.
Term
 Public Key Infrastructure (PKI)
Definition
 Provides:ConfidentialityAccess ControlIntegrityAuthenticationNonrepudiation
Supporting users have an ad free experience!