Encryption Fundamentals

0.0(0)
studied byStudied by 0 people
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/35

flashcard set

Earn XP

Description and Tags

Flashcards for review of Chapter 6: Encryption Fundamentals

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

36 Terms

1
New cards

Why is understanding encryption important?

A basic level of understanding encryption is crucial because if traffic is not encrypted, it is vulnerable, regardless of firewalls or security instruments.

2
New cards

What is the history of encryption?

Encryption was originally used in military communications and has evolved to include telephone, radio, and Internet/computer communications.

3
New cards

Name some early methods of encryption.

Single-Alphabet Substitution, Multi-Alphabet Substitution, Rail Fence, Vigenère, and Enigma.

4
New cards

Name the binary operations used as early encryption methods.

AND, OR, XOR.

5
New cards

What does the AND binary operation state?

It states that 1 + 1 = 1.

6
New cards

What does the OR binary operation state?

There must be a 1 in either of the numbers to result in 1 for that position.

7
New cards

What does the XOR binary operation state?

If a position has 1 in one number but not the other, then the result is 1.

8
New cards

Name some modern encryption methods.

Symmetric Encryption, Key Stretching, PRNG, Public Key Encryption, and Digital Signatures.

9
New cards

Name some symmetric encryption methods.

DES, Blowfish, and Advanced Encryption Standard (AES).

10
New cards

How does DES work?

Uses a symmetric key system, divides and transposes data, sends data through a series of steps, scrambles with a swapping algorithm, and transposes one last time.

11
New cards

What is Blowfish?

Symmetric block cipher designed in 1993 by Bruce Schneier.

12
New cards

What is Advanced Encryption Standard (AES)?

Uses Rijndael algorithm, is a block cipher, and specifies three key sizes: 128, 192, and 256 bits.

13
New cards

What is the International Data Encryption Algorithm (IDEA)?

Uses subkeys generated from a 128-bit key.

14
New cards

What are Pseudo-Random Number Generators (PRNG)?

These generate cipher keys for symmetric ciphers and are 'random enough'.

15
New cards

What are the three desired properties of PRNGs?

Uncorrelated sequences, long period, and uniformity.

16
New cards

What is Key Stretching?

It lengthens a key to make it stronger.

17
New cards

Name two widely used key stretching algorithms.

Password-Based Key Derivation Function 2 (PBKDF2) and bcrypt.

18
New cards

How does Public Key Encryption work?

One key is used to encrypt (public key) and another to decrypt (private key).

19
New cards

Name some Public Key Encryption Methods.

RSA, Diffie-Hellman, ElGamal, MQV, Digital Signature Algorithm (DSA), and Elliptic Curve.

20
New cards

What are digital signatures?

These use asymmetric cryptography in reverse order to verify who sent the message.

21
New cards

What is a digital certificate?

A digital document that contains a public key signed by a trusted third party, a Certificate Authority (CA).

22
New cards

What is X.509?

An international standard for the format and information contained in a digital certificate.

23
New cards

What is the primary role of Certificate Authorities (CA)?

Digitally sign and publish the public key of a given user.

24
New cards

What is Public Key Infrastructure (PKI)?

An arrangement that binds public keys with respective user identities by means of a CA.

25
New cards

What is Pretty Good Privacy (PGP)?

A system that offers digital signatures, asymmetric encryption, and symmetric encryption, often found in e-mail clients and uses its own certificate format.

26
New cards

What is Hashing?

Takes a variable-size input and returns a fixed-size string.

27
New cards

What is a hash value?

The value returned by hashing.

28
New cards

Name some hashing methods.

Secure Hash Algorithm (SHA), MD5, RACE Integrity Primitives Evaluation Message Digest (RIPEMD), and HAVAL.

29
New cards

What does salt refer to in hashing?

Random bits that are used as one of the inputs to the hash to complicate dictionary and rainbow table attacks.

30
New cards

What is Cryptanalysis?

The science of trying to find alternate ways to break cryptography.

31
New cards

Name some methods of cryptanalysis.

Brute force, frequency analysis, known plaintext, chosen plaintext, related key attack, birthday attack, differential cryptanalysis, and linear cryptanalysis.

32
New cards

What is Steganography?

The art and science of writing hidden messages in such a way that nobody suspects the existence of the message.

33
New cards

What is a Payload in steganography?

The data to be covertly communicated.

34
New cards

What is a Carrier in steganography?

The signal, stream, or data file into which the payload is hidden.

35
New cards

What is Steganalysis?

Detecting hidden messages.

36
New cards

What is Quantum computing?

Allows more values than binary states and is superior at factoring large numbers.