Term
Public encrypts; private decrypts in what encryption type? |
|
Definition
|
|
Term
Function which creates a signature of a file. Helps in proving integrity. |
|
Definition
|
|
Term
Study of protecting information, whether in transit or at rest. |
|
Definition
|
|
Term
|
Definition
|
|
Term
In cryptography, the term for encrypted data |
|
Definition
|
|
Term
Rendering sender unable to deny they sent something. |
|
Definition
|
|
Term
Cipher method in which bits are encyrpted one bit at a time. |
|
Definition
|
|
Term
Encrypted in sets of data, usually 64 bits at a time |
|
Definition
|
|
Term
Substitution and transposition are algorithms used in which encryption method. |
|
Definition
|
|
Term
Primary algorithm used in stream cipher. |
|
Definition
|
|
Term
Speed is a benefit of which encryption method. |
|
Definition
|
|
Term
|
Definition
If the key is smaller than the data, successful cryptanalysis is possible via frequency attack |
|
|
Term
De Facto encryption standard |
|
Definition
|
|
Term
multiplies two prime numbers. |
|
Definition
|
|
Term
|
Definition
|
|
Term
Used for encryption and digital signatures |
|
Definition
|
|
Term
|
Definition
Repository for government encryption access when there are legal issues, such as subpoenas |
|
|
Term
Asymmetric encryption disadvantage |
|
Definition
Requires large encryption keys. |
|
|
Term
|
Definition
|
|
Term
|
Definition
|
|
Term
|
Definition
|
|
Term
|
Definition
|
|
Term
|
Definition
|
|
Term
Symmetric Encryption AKA (4) |
|
Definition
Single / secret / shared / private |
|
|
Term
Symmetric Encryption drawbacks (2) |
|
Definition
Key sharing is complicated / Scalability |
|
|
Term
Typical data block size of symmetric key encryption |
|
Definition
|
|
Term
Encryption method which replaces character with another character, or bit with another bit. |
|
Definition
|
|
Term
|
Definition
|
|
Term
Diffie-Hellman encryption type |
|
Definition
|
|
Term
Diffie-Hellman used in which two protocols |
|
Definition
Encryption used in IPSEC and SSL protocols |
|
|
Term
Diffie-Hellman vulnerable to... |
|
Definition
Vulnerable to man-in-the-middle attacks (MITM) when digital signature use is waived |
|
|
Term
|
Definition
Elliptic Curve Cryptosystem |
|
|
Term
Elliptic Curve Cryptosystem (ECC)used on what devices? |
|
Definition
Encryption method used by mobile devices |
|
|
Term
Elliptic Curve Cryptosystem (ECC) benefit |
|
Definition
Uses less computational power |
|
|
Term
El Gamal (difference from RSA) |
|
Definition
Encryption method not based on prime number factoring |
|
|
Term
|
Definition
Uses discrete logarithm problems for encryption and digital signatures |
|
|
Term
First government accepted digital signature scheme |
|
Definition
|
|
Term
First government accepted digital signature scheme; it meets Digital Signature Standard (DSS), one of the Federal Information Processing Standards (FIPS) |
|
Definition
|
|
Term
Hash function(definition) |
|
Definition
Any algorithm that maps data of variable length to data of a fixed length |
|
|
Term
Results of hashing function (5 synonyms) |
|
Definition
hashes, hash values, hash codes, hash sums, checksums |
|
|
Term
Used to crack a hash algorithm |
|
Definition
|
|
Term
Collision (hash, definition) |
|
Definition
When 2 or more files create the same output from a hash function |
|
|
Term
|
Definition
Public Key Infrastructure |
|
|
Term
|
Definition
|
|
Term
|
Definition
|
|
Term
|
Definition
Web of Trust / Single authority System / Hierarchical Trust System |
|
|
Term
|
Definition
User trust certificates they have exchanged with another person, and further they trust everyone who the other person trusts and so on |
|
|
Term
|
Definition
There is one entity which holds all certificates-the Certificate Authority |
|
|
Term
Hierarchical Trust System |
|
Definition
There is a certificate authority at the top and then all the entities below it which are trusted by the certificate authority to do their job on their behalf |
|
|
Term
Fields in a digital certificate (8) |
|
Definition
Public key, Serial Number, Subject/Algorithm, Issuer, Valid From date, Valid To date, Key Usage (purpose of use), optional fields |
|
|
Term
Current PKI world standard version number |
|
Definition
|
|
Term
key size is deemed by the US government as uncrackable |
|
Definition
|
|
Term
Avenues of encrypted communications |
|
Definition
(SSIP) Secure shell (SSH) / Secure Socket Layer (SSL) / Internet Protocol Security (IPSec) / Point-to-point tunneling Protocol (PPTP) |
|
|
Term
Two things to ensure your encryption is effectively uncrackable |
|
Definition
Use a large key, Change the key on a regular basis |
|
|
Term
Encryption algorithms turn what into what? |
|
Definition
Plaintext into ciphertext |
|
|
Term
When both parties cannot deny the message was sent /received |
|
Definition
|
|
Term
Encryption method which cannot be broken if the message is truly random, used only once and has no repeating patterns |
|
Definition
|
|
Term
Name three problems which symmetric encryption algorithms have that asymmetric encryption algorithms do not |
|
Definition
Scalability issue / key exchange issue / lack of non-repudiation |
|
|