Term
IKE (Internet Key Exchange) |
|
Definition
IPSec uses as its key exchange protocol. De facto standard and is a combination of ISAKMP and OAKLEY. |
|
|
Term
|
Definition
Provides protection for each message that is sent between two computers, but not the actual link. |
|
|
Term
|
Definition
Protects the communication channel. Uses SSL for security purposes. |
|
|
Term
Pretty Good Privacy (PGP) |
|
Definition
An e-mail security program that uses public key encryption. It uses a web of trust instead of the hierarchical structure used in PKI. |
|
|
Term
Message Security Protocol (MSP) |
|
Definition
|
|
Term
Privacy-Enhanced Mail (PEM) |
|
Definition
An Internet standard that provides secure e-mail over the Internet by using encryption, digital signatures, and key management. |
|
|
Term
|
Definition
Key agreement protocol and does not provide encryption for data and cannot be used in digital signatures. |
|
|
Term
|
Definition
It pertains to creating, maintaining, distributing, and destroying cryptographic keys. |
|
|
Term
Algorithms used for digital signatures |
|
Definition
RSA, El Gamal, ECDSA, and DSA. |
|
|
Term
|
Definition
The result of a user signing a hash value with a private key. It provides authentication, data integrity, and nonrepudiation. |
|
|
Term
|
Definition
A pad with random values that are XORed against the message to produce ciphertext. The pad is at least as long as the message itself and is used once and then discarded. |
|
|
Term
|
Definition
Attack on hashing functions through brute force. The attacker tries to create two messages with the same hashing value. |
|
|
Term
|
Definition
SHA-1, MD2, MD4, MD5, and HAVAL. |
|
|
Term
|
Definition
mathematical function that is easier to compute in One direction than in the opposite direction. |
|
|
Term
|
Definition
Symmetric key used by the sender and receiver of messages for encryption and decryption purposes. |
|
|
Term
Examples of asymmetric key algorithms |
|
Definition
RSA, ECC, Diffie-Hellman, El Gamal, Knapsack, and DSA. |
|
|
Term
Examples of symmetric key algorithms |
|
Definition
DES, 3DES, Blowfish, IDEA, RC4, RC5, RC6, and AES. |
|
|
Term
|
Definition
Random string of bits that is inserted into an encryption algorithm. The result determines what encryption functions will be carried out on a message and in what order. |
|
|
Term
|
Definition
Change a character (or bit) out for another. |
|
|
Term
|
Definition
Scramble the characters (or bits). |
|
|
Term
|
Definition
The range of possible keys |
|
|
Term
|
Definition
Mathematical rules that dictate the functions of enciphering an deciphering. |
|
|
Term
|
Definition
|
|
Term
|
Definition
|
|
Term
|
Definition
Service that ensures that the sender cannot later falsely deny sending a message. |
|
|
Term
2 basic types of encryption mechanisms used in symmetric ciphers |
|
Definition
Substitution and transposition. |
|
|
Term
Algorithm where the sender and receiver use the same key for encryption and decryption purposes. |
|
Definition
|
|
Term
Algorithm where the sender and receiver use different keys for encryption and decryption purposes. |
|
Definition
|
|
Term
Has the barrier of secure key distribution and scalability. |
|
Definition
|
|
Term
Provides confidentiality, but not authentication or nonrepudiation. |
|
Definition
|
|
Term
|
Definition
|
|
Term
Used to encrypt bulk data. |
|
Definition
|
|
Term
If a user encrypts data with his private key... |
|
Definition
...it can only be decrypted by his public key. |
|
|
Term
Provide authentication and nonrepudiation services |
|
Definition
|
|
Term
Usually implemented in software. |
|
Definition
|
|
Term
Usually implemented in hardware. |
|
Definition
|
|
Term
When symmetric and asymmetric key algorithms are used together. |
|
Definition
|
|
Term
Provides data integrity only. |
|
Definition
|
|
Term
When a hash algorithm is applied to a message is produces... |
|
Definition
|
|
Term
Produces a variable-length hash value |
|
Definition
|
|
Term
|
Definition
Attacker has the ciphertext of several messages and their goal is to discover the key. |
|
|
Term
|
Definition
Attacker has the plaintext and ciphertext of one or more messages and their goal is to discover key |
|
|
Term
|
Definition
Attacker has the plaintext and ciphertext, but the attacker can choose the plaintext that gets encrypted to see the corresponding ciphertext. Goal is to discover key. |
|
|
Term
|
Definition
Attacker can choose the ciphertext to be decrypted and has access to the resulting decrypted plaintext, goal is to discover key. |
|
|
Term
Differential Cryptanalysis |
|
Definition
Attacker takes two messages of plaintext and follows the changes that take place to the blocks as they go through the different S-boxes, their goal is to discover key. |
|
|
Term
|
Definition
Attacker carries out a known-plaintext attack on several different messages encrypted with the same key. |
|
|
Term
|
Definition
Attacker measures power consumption, radiation emissions, and the time it takes for certain types of data processing with goal to discover key. |
|
|
Term
|
Definition
Attacker captures some type of data and resubmits it with the hopes of fooling the receiving device into thinking it is legitimate information, goal is to discover key. |
|
|
Term
Provides integrity and data origin authentication |
|
Definition
|
|
Term
Uses a block cipher for the process of creating a MAC. |
|
Definition
|
|
Term
|
Definition
1. Sender puts a message through a hashing algorithm and generates a message digest (MD) value. 2. Sender sends message and MD value to receiver. 3. Receiver runs just the message through the same hashing algorithm and creates an independent MD value. 4. Receiver compares both MD values. If they are the same the message was not modified. |
|
|
Term
|
Definition
1. Sender concatenates a message and secret key and puts the result through a hashing algorithm. This creates a MAC value. 2. Sender appends the MAC value to the message and sends it to the receiver. 3. The receiver takes just the message and concatenates it with her own symmetric key. This results in an independent MAC value. 4. The receiver compares the two MAC values. If they are the same, the receiver knows that the message was not modified and knows from which system it came. |
|
|
Term
|
Definition
1. Sender encrypts a message with a symmetric block algorithm in CBC mode. 2. The last block is used as the MAC. 3. The plaintext message and the appended MAC are sent to the receiver. 4. The receiver encrypts the message, creates a new MAC, and compares the two values. If they are the same, the receiver knows that the message was not modified and from which system it came. |
|
|