Shared Flashcard Set

Details

Cryptography
Cryptography Stuff
17
Computer Networking
Undergraduate 1
02/04/2019

Additional Computer Networking Flashcards

 


 

Cards

Term
ECB
Definition
Electronic Code Block | Block Cipher
Sucks because the the output is put in same order every time, you can figure out information.
Information goes in, Encrypted, Next
Term
CBC
Definition
Cipher Block Chaining | Block Cipher
First block is XOR'd against IV.

Then encrypted.

Then the encryption for the first block becomes IV for the next sets of block

Repeat
Term
CFB
Definition
Cipher Feedback | Block Cipher

IV is encrypted.

XOR the output of the IV with the input

This XOR output is then used as the IV of the next block

new IV is encrypted. Repeat.
Term
OFB
Definition
Output Feedback | Block Cipher -> Stream Cipher

IV is Encrypted

Encrypted IV is XOR'd against input of first block

Keep using original IV and go on to next block

(Not secured?)
Term
CTR
Definition
Counter Mode | Block Cipher
Random or PsuedoRandom NONCE value concatenate with counter

NONCE concatenate Counter then encrypts it as IV

XOR'd Against the First block,

Use NONCE and increment the counter as Next IV to be encrypted then to be XOR'd against next block
Term
RSA
Definition
Asymmetric Algorithm.
Very good one. Not the most space friendly though

Uses 2 very high Prime Number to use as key
Term
HMAC
Definition
Hash-Based Message Authentication Code | MAC
Stream Cipher | Integrity Purpose
Term
PGP/GPG
Definition
Pretty Good Privacy: super old thing but it is used for encryption and decryption using a RANDOM TEMPORARY key and a public key. Relies on trust of actual people, used to have to call people to issue session keys.
Web of Trust between multiple certificates, at the end of the day it was a bit of a failiure but does work just fine in a pki world.

Encrypts email, pki support , and S/MIME email
_______________________________________
Encrypt Data with Random Temporary Key
Encrypt Random Temporary Key with Receivers Public Key
Encrypted Data and Encrypted Key is Encrypted Message
Term
Diffie Hellman
Definition
Sets up a session via Asymmetric then after it is set up switch to symmetric . Secure way to trade keys (color concept) Can ask for Elliptic Curve in group for extra security, able to hold VERY large keys
________________________________________
(g^a mod p)^b mod p = g^(ab) mod p
(g^b mod p)^a mod p = g^(ba) mod p
Term
AES
Definition
Symmetric | Block Cipher
Very good Symmetric key algorithm
Fixed Block Size (128 bit) and key sizes of 128,192 or 256 bits.
Term
DES
Definition
Symmetric | Block Cipher
Symmetric used to be good but is kinda shitty now.
64-bit blocks - 56-bit key - 64-bit output
Encryption uses 48 different bits key for everyone round of encryption. Decryption is the inverse process making it inherently vulnerable
Term
3DES
Definition
Symmetric | Block Cipher
Symmetric Good now but kinda big. Literally just one shitty algorithm kaio ken x3 but its secure I guess
Term
ECC
Definition
Elliptic curve algorithm. Asymmetric Key that is very good but is a lot smaller and space conscious

Uses key sizes of 56-bits, 112-bits or 168-bits.
Term
RC4
Definition
Symmetric | Stream Cipher
Symmetric Good but not that popular

40-2048 bits (often use as encryption mechanism in SSL and TLS when encrypting HTTPS)

Can now be broken into
Term
Blowfish
Definition
Symmetric | Block Cipher
Encrypts data at 64 bit block
Key Size: 32 - 448

Faster than AES
Term
Twofish
Definition
Symmetric | Block Cipher
Encrypts data at 128 bit blocks
Keysize: 128, 192, 256 bits
Term
Perfect forward secrecy
Definition
cryptographic system generates random public keys for each
session and it doesn’t use a deterministic algorithm to do so. In other words,
given the same input, the algorithm will create a different public key
Supporting users have an ad free experience!