Security in Data Domains

0.0(0)
studied byStudied by 0 people
GameKnowt Play
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/15

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

16 Terms

1
New cards

Cryptography

  1. Scrambling information so it appears unreadable

  2. Transforms information into secure form

  3. Provides five basic information protections

    • Confidentiality

      • Insures only authorized parties can view it

    • Integrity

      • Insures information is correct and unaltered

    • Availability

      • Authorized users can access it

    • Authenticity of the sender

      • refers to the proven fact that something is legitimate or real

    • Nonrepudiation/Accountability

      • Proves that a user performed an action

2
New cards

Encryption

Changing original text into a secret message using cryptography

3
New cards

Decryption

Changing secret message back to original form

4
New cards

Plaintext

Data to be encrypted

Input into an encryption algorithm

5
New cards

Ciphertext

Data that was encrypted

6
New cards

Key

Mathematical value entered into the algorithm to produce ciphertext and vice versa

7
New cards

Symmetric Cryptographic Algorithm

Uses a secret key to encrypt and to decrypt messages.

The secret key cannot be made public and known only to the sender and receiver.

Need a secure channel to distribute the key

Perform faster than most public key cryptographic algorithms

Weakness of symmetric algorithm:

Distributing and maintaining a secure single key among multiple users distributed geographically

Examples:

  • Data Encryption Standard (DES)

  • Triple DES (3DES)

  • Advanced Encryption Standard (AES)

  • RC4

8
New cards

Stream Cipher

Symmetric algorithm category that encrypts data one bit (or character) at a time as they become available

9
New cards

Block cipher

Symmetric algorithm category that works on entire block of plaintext at a time

Separate blocks of 8 to 16 bytes encrypted independently

Blocks randomized for additional security

10
New cards

Substitution cipher

Substitutes characters in plaintext with their respective characters in a substitution alphabet.

11
New cards

Transposition cipher

Rearranges letters without changing them

12
New cards

Other symmetric algorithms

Rivest Cipher

Family of cipher algorithm designed by Ron Rivest

International Data Encryption Algorithm

Used in European nations

Block cipher processing 64 bits with a 128-bit key with 8 rounds

Blowfish

Block cipher operating on 64-bit blocks with key lengths from 32-448 bits

No significant weaknesses have been identified

13
New cards

Asymmetric Cryptographic Algorithm

Weakness:

Needs more computing power than symmetric

Also known as public key cryptography

Uses two mathematically related keys

Public key available to everyone and freely distributed

Private key known only to individual to whom it belongs

Different keys are used to encrypt and decrypt message

Examples:
RSA

14
New cards

Hashing Algorithm

A cryptographic hash algorithm produces a irreversible fixed length string or hash from variable length message known as hash value/message digest.

Unlikely that different messages produce the same hash value

Used for confidentiality (to store passwords securely) and for authentication, non repudiation, and integrity (as part of a digital signature)

Examples:

  • Message Digest 5 (MD5)

  • Secure Hash Algorithm (SHA)

15
New cards

Digital Signature

Verifies the sender

Used to prove a document originated from a valid sender

Prevents sender from disowning the message

Proves message integrity

16
New cards

Steganography

Hiding the existence of data

Embedding messages into image, audio, or video files

Achieved by dividing data and hiding in unused portions of the file

Invisibly altering the structure of a digital image