Shared Flashcard Set

Details

Crypto
CRYPTO for CISSP
53
Computer Networking
Professional
06/22/2011

Additional Computer Networking Flashcards

 


 

Cards

Term
IKE (Internet Key Exchange)
Definition
IPSec uses as its key exchange protocol. De facto standard and is a combination of ISAKMP and OAKLEY.
Term
S-HTTP
Definition
Provides protection for each message that is sent between two computers, but not the actual link.
Term
HTTPS
Definition
Protects the communication channel. Uses SSL for security purposes.
Term
Pretty Good Privacy (PGP)
Definition
An e-mail security program that uses public key encryption. It uses a web of trust instead of the hierarchical structure
used in PKI.
Term
Message Security Protocol (MSP)
Definition
The military’s PEM.
Term
Privacy-Enhanced Mail (PEM)
Definition
An Internet standard that provides secure e-mail over the Internet by using encryption, digital signatures, and key management.
Term
Diffie-Hellman
Definition
Key agreement protocol and does not provide encryption for data and cannot be used in digital signatures.
Term
Key management
Definition
It pertains to creating, maintaining, distributing, and destroying cryptographic keys.
Term
Algorithms used for digital signatures
Definition
RSA, El Gamal, ECDSA, and DSA.
Term
Digital signature
Definition
The result of a user signing a hash value with a private key. It provides authentication, data integrity, and nonrepudiation.
Term
One-time pad
Definition
A pad with random values that are XORed against the message to produce ciphertext. The pad is at least as long as the message itself and is used once and then discarded.
Term
A birthday attack
Definition
Attack on hashing functions through brute force. The attacker tries to create two messages with the same hashing value.
Term
Hashing algorithms
Definition
SHA-1, MD2, MD4, MD5, and HAVAL.
Term
One-way function
Definition
mathematical function that is easier to compute in
One direction than in the opposite direction.
Term
Session key
Definition
Symmetric key used by the sender and receiver of messages for encryption and decryption purposes.
Term
Examples of asymmetric key algorithms
Definition
RSA, ECC, Diffie-Hellman, El Gamal, Knapsack, and DSA.
Term
Examples of symmetric key algorithms
Definition
DES, 3DES, Blowfish, IDEA, RC4, RC5, RC6, and AES.
Term
A key
Definition
Random string of bits that is inserted into an encryption algorithm. The result determines what encryption functions will be carried out on a message and in what order.
Term
Substitution ciphers
Definition
Change a character (or bit) out for another.
Term
Transposition ciphers
Definition
Scramble the characters (or bits).
Term
Keyspace
Definition
The range of possible keys
Term
Cryptographic algorithms
Definition
Mathematical rules that dictate the functions of enciphering an deciphering.
Term
Plaintext
Definition
A readable message.
Term
Ciphertext
Definition
Encrypted message.
Term
Nonrepudiation
Definition
Service that ensures that the sender cannot later falsely deny sending a message.
Term
2 basic types of encryption mechanisms used in symmetric ciphers
Definition
Substitution and transposition.
Term
Algorithm where the sender and receiver use the same key for encryption and decryption purposes.
Definition
Symmetric key algorithm
Term
Algorithm where the sender and receiver use different keys for encryption and decryption purposes.
Definition
Asymmetric key algorithm
Term
Has the barrier of secure key distribution and scalability.
Definition
Symmetric key
Term
Provides confidentiality, but not authentication or nonrepudiation.
Definition
Symmetric key
Term
Used to encrypt keys.
Definition
Asymmetric algorithm
Term
Used to encrypt bulk data.
Definition
Symmetric algorithm
Term
If a user encrypts data with his private key...
Definition
...it can only be decrypted by his public key.
Term
Provide authentication and nonrepudiation services
Definition
Asymmetric key algorithm
Term
Usually implemented in software.
Definition
Block ciphers
Term
Usually implemented in hardware.
Definition
Stream ciphers
Term
When symmetric and asymmetric key algorithms are used together.
Definition
Hybrid System
Term
Provides data integrity only.
Definition
Hashing algorithms
Term
When a hash algorithm is applied to a message is produces...
Definition
Message digest
Term
Produces a variable-length hash value
Definition
HAVAL
Term
Ciphertext-Only Attack
Definition
Attacker has the ciphertext of several messages and their goal is to discover the key.
Term
Known-Plaintext Attack
Definition
Attacker has the plaintext and ciphertext of one or more messages and their goal is to discover key
Term
Chosen-Plaintext Attack
Definition
Attacker has the plaintext and ciphertext, but the attacker can choose the plaintext that gets encrypted to see the corresponding ciphertext. Goal is to discover key.
Term
Chosen-Ciphertext Attack
Definition
Attacker can choose the ciphertext to be decrypted and has access to the resulting decrypted plaintext, goal is to discover key.
Term
Differential Cryptanalysis
Definition
Attacker takes two messages of plaintext and follows the changes that take place to the blocks as they go through the different S-boxes, their goal is to discover key.
Term
Linear Cryptanalysis
Definition
Attacker carries out a known-plaintext attack on several different messages encrypted with the same key.
Term
Side Channel Attack
Definition
Attacker measures power consumption, radiation emissions, and the time it takes for certain types of data processing with goal to discover key.
Term
Replay Attack
Definition
Attacker captures some type of data and resubmits it with the hopes of fooling the receiving device into thinking it is legitimate information, goal is to discover key.
Term
Provides integrity and data origin authentication
Definition
HMAC (Hased MAC)
Term
Uses a block cipher for the process of creating a MAC.
Definition
CBC-MAC
Term
Hash
Definition
1. Sender puts a message through a
hashing algorithm and generates a
message digest (MD) value.
2. Sender sends message and MD value
to receiver.
3. Receiver runs just the message
through the same hashing algorithm
and creates an independent MD value.
4. Receiver compares both MD values. If
they are the same the message was not
modified.
Term
HMAC
Definition
1. Sender concatenates a message and
secret key and puts the result through
a hashing algorithm. This creates a MAC
value.
2. Sender appends the MAC value to the
message and sends it to the receiver.
3. The receiver takes just the message
and concatenates it with her own
symmetric key. This results in an
independent MAC value.
4. The receiver compares the two MAC
values. If they are the same, the receiver
knows that the message was not modified
and knows from which system it came.
Term
CBC-MAC
Definition
1. Sender encrypts a message with a
symmetric block algorithm in CBC mode.
2. The last block is used as the MAC.
3. The plaintext message and the
appended MAC are sent to the receiver.
4. The receiver encrypts the message,
creates a new MAC, and compares the
two values. If they are the same, the
receiver knows that the message was not
modified and from which system it came.
Supporting users have an ad free experience!