Term
|
Definition
- AES - DES - 3DES - RC4 - Blowfish/Twofish |
|
|
Term
Key stretching algorithms |
|
Definition
|
|
Term
|
Definition
- CBC - GCM - ECB - CTR - Stream vs. block |
|
|
Term
|
Definition
|
|
Term
|
Definition
- RSA - DSA - Diffie-Hellman - Groups - DHE - ECDHE - Elliptic curve - PGP/GPG |
|
|
Term
|
Definition
- XOR - ROT13 - Substitution ciphers |
|
|
Term
Hash-based Message Authentication Code - HMAC |
|
Definition
- very fast form of hashing - Combines hash with secret key - Integrity and authenticity without using PKI - Used with IPSec and TLS |
|
|
Term
|
Definition
-A method of making something difficult to understand -combines binary data with a key to produce cipher text |
|
|
Term
|
Definition
-Caesar cipher type -substitutes one letter with another letter |
|
|
Term
Galois Counter Mode - GCM |
|
Definition
-Counter Mode with additional mathematical functions -both encryption and authentication at the same time -Efficient -used for network communication -IPSec TUnnels -Used with SSH and TLS |
|
|
Term
Message Digest Algorithm - MD5 |
|
Definition
-Designed by Ronald Rivest -1992 -1996 many collisions -2008 created forged cert from Rapid-SSL -2008, researchers able to build a certificate that appeared to be from a certificate authority |
|
|
Term
Electronic Code Book - ECB |
|
Definition
-Encrypts blocks of text doing XOR with the same key -Identical text produces identical cipher text |
|
|
Term
Cipher Block Chaining - CBC |
|
Definition
-Encrypts first group of data with an IV -Encrypts subsequence blocks by performing XOR with previous group of encrypted data |
|
|
Term
|
Definition
-Implementation of PGP -Windows, MAC, Linux |
|
|
Term
|
Definition
-Makes CBC block cipher into a stream cipher -Transmission errors do not propagate |
|
|
Term
DSA - digital signature algorithm |
|
Definition
-Modification of Diffie-Hellman key exchange -Used for guaranteeing source |
|
|
Term
Secure Hash Algorithm 1 - SHA1 |
|
Definition
-National Security Agency -part of the Federal Information Processing Standard -160-bit digest -2005 there were collisions found |
|
|
Term
|
Definition
-Obfuscation -Substitutes one letter with another at a fixed position |
|
|
Term
Password Based Key Derivation Function 2 PBKDF2 |
|
Definition
-Part of RSA cryptography -PKCS #5, RFC 2898 -Key Stretch |
|
|
Term
pretty good privacy (PGP) |
|
Definition
-RFC 4880 -Asymmetric encryption -1991 Phil Zimmerman |
|
|
Term
Legitimate Versions of RIPEMED |
|
Definition
-RIPEMED-128 -RIPEMED-160 -RIPEMED-256 -RIPEMED-320 |
|
|
Term
Ephemeral Diffie-Hellman - DHE |
|
Definition
-Used for keys used to generate session keys -Uses different key for each session |
|
|
Term
Ciphertext FeedBack - CFB |
|
Definition
-Used to use CBC as a stream cipher -CBC is fixed length -Applies to smaller values -Previous ciphertext used to encrypt -Allow errors to propagate |
|
|
Term
Elliptical Curve Diffie-Hellman - ECDHE |
|
Definition
-Uses points on an elliptical curve to generate randomness -Very efficient and fast -Allows smaller key sizes |
|
|
Term
|
Definition
-Variable length real time data -Fixed length groups of data |
|
|
Term
|
Definition
-allows two devices to decide on a common symmetric key that can then be used for symmetric encryption |
|
|
Term
|
Definition
-digests up to 512 bit -NSA |
|
|
Term
RSA - Rivest, Shamir, and Adelman |
|
Definition
-encrypt information -decrypt information -digital signatures -Uses very large prime numbers to encrypt |
|
|
Term
Federal Information Processing Standard (FIPS ) |
|
Definition
-for Digital Signatures -government standard |
|
|
Term
|
Definition
-generates hashes from passwords -Uses Blowfish -Extension to UNIX crypt library -Key Stretching |
|
|
Term
|
Definition
-like stream cipher -uses a fixed sized counter -starts at any value -xor key with counter and xor result with plaintext block |
|
|
Term
Race Integrity Primitives Evaluation Message Digest - RIPEMD |
|
Definition
-the research and development in advanced communication and technologies in Europe -Collisions were found with RIPEMD in 2004 |
|
|
Term
Race Integrity Primitives Evaluation Message Digest - RIPEMD-160 |
|
Definition
A message digest algorithm and cryptographic hash function. An improved version of a previous 40 bit algorithm. |
|
|
Term
|
Definition
A curve that is defined by a mathematical equation that has no cusps or self-intersections. |
|
|
Term
EAP protocol that does not require the use of client or server certificates |
|
Definition
|
|
Term
AES - Advanced Encryption Standard |
|
Definition
- supersedes the Data Encryption Standard (DES),[7] which was published in 1977.
- a symmetric-key algorithm, meaning the same key is used for both encrypting and decrypting the data.
- 128, 192, and 256 bit variants selected by NIST
- Rijndael block cipher |
|
|
Term
|
Definition
The form of encryption where only a single key can encrypt and decrypt information |
|
|
Term
|
Definition
-Private Key -Max key size 256 bit -Symmetric |
|
|
Term
|
Definition
Chaotic Tent Mapping Encryption of Digital Images |
|
|
Term
|
Definition
Format that would be used for a certificate file used to sign powershell scripts |
|
|
Term
SSL (Secure Sockets Layer) |
|
Definition
An earlier version of TLS that was used with protocols such as HTTPS and FTPS. TLS replaced it. |
|
|
Term
|
Definition
A protocol used for real time data that uses AES for confidentiality |
|
|
Term
|
Definition
The following are symmetric ciphers used for encryption - AES - DES - 3DES - RC4 - Blowfish/Twofish |
|
|