What is used to protect against fraud in electronic fund transfers (EFT)?
Definition
Message Authentication Code (MAC), ANSI X9.9.
The MAC is a check value, Cyclic Redundancy Check (CRC), which is derived from the contents of the message itself, that is sensitive to the bit changes in a message.
Term
In Rijndael, both block length and key length can be extended very easily to multiples of ____ bits.
Definition
Both block length and key length can be extended very easily to multiples of 32 bits.
Term
MD5 specifications: - algorithm type - # of bits - rounds
Definition
MD5 specifications (RFC1312)
- one-way has hash - 128 bits - 4 rounds
Term
The three Rinjdael transformations are:
Definition
The three Rinjdael transformations are:
The non-linear layer, the linear mixing layer
the key addition layer
Term
Rijndael rounds for 128 bits key/block size ___
Rijndael rounds for 192 bits key/block size ___
Rijndael rounds for 256 bits key/block size ___
Definition
10 rounds if the key/block size is 128 bits
12 rounds if the key/block size is 192 bits
14 rounds if the key/block size is 256 bits
Term
Wireless Application Protocol (WAP) protocol
is a specification for a set of communication protocols to standardize Internet access, including e-mail, the World Wide Web, newsgroups, and instant messaging for wireless devices, such as cellular telephones and radio transceivers, can be used
WAP1 stack include:
Definition
The Wireless Markup Language (WML) and script and
Wireless Session Protocol (WSP) Session Layer
(HTTP/1.1)
Wireless Transaction Protocol (WTP) connection-mode, reliable similar to TCP
Key recovery technique for storing knowledge of a cryptographic key by encrypting it with another key and ensuring that that only certain third parties can perform the decryption operation to retrieve the stored key:
Definition
Key encapsulation
Term
Web Programming Model, Pull Model
Definition
Client requests content from the server
(Request/Resopnse)
Term
Programming Model, Push Model
Definition
Server can proactively send content to the client
Term
PKCS #7: Cryptographic Message Syntax
Request for Comments: 2315
Definition
digital signatures
digital envelopes - hybryd encryption scheme first encrypting the data using a symmetric encryption algorithm and a secret key, and then encrypting the secret key using an asymmetric encryption algorithm and the public key of the intended recipient
Term
Key sequence of DES
Definition
Sequence of 8 Bytes = 64 bits.
Each Bytes has 8 bits (seven key bits and a parity bit) => 56 bit key and 8 bit parity.
Term
Key agreement scheme with implicit signatures
Definition
MQV (Menezes–Qu–Vanstone) is an authenticatedprotocol for key agreement based on the Diffie–Hellman scheme. MQV provides protection against an active attacker. The protocol can be modified to work in an arbitrary finite group, in elliptic curve groups, where it is known as elliptic curve MQV (ECMQV).
Both parties in the exchange calculate an implicit signature using its own private key and the other's public key
Term
RFC2828
Definition
Internet Security Glossary
Term
Known-plaintext attack (crib )
Definition
Cryptanalysis technique to determine the key from knowledge of some plaintext-ciphertext pairs
Term
Chosen-plaintext attack
Definition
Cryptanalysis technique to determine the key from knowledge of ciphertext that corresponds to certain plaintext selected (dictated) by the analyst.
Term
Chosen-ciphertext attack
Definition
Cryptanalysis technique to determine the key from knowledge of plaintext that corresponds to ciphertext selected (i.e., dictated) by the analyst.
Term
Known-ciphertext attack
Definition
Cryptanalysis technique to determine the key from knowledge of some ciphertext.
Term
What cipher uses a key of the same length as the message