Term
|
Definition
Breaks the plaintext into blocks and encrypts each with the same algorithm |
|
|
Term
|
Definition
Cryptographic transformation operates on the characters or bites |
|
|
Term
|
Definition
Unintelligible message, also know as a Cryptogram |
|
|
Term
|
Definition
Plaintext message generates identical ciphertext using the same algorithm but different keys |
|
|
Term
|
Definition
A cryptographic transformation that operates at the word or phrase level |
|
|
Term
|
Definition
Act of obtaining plaintext or key from ciphertext |
|
|
Term
|
Definition
Step-by-step procedure used to encipher plaintext and decipher ciphertext |
|
|
Term
|
Definition
Art and Science of hiding the meaning of communication |
|
|
Term
|
Definition
Encompasses cryptography and cryptanalysis |
|
|
Term
|
Definition
Set of transformations from message space to ciphertext space |
|
|
Term
|
Definition
To make a message unintelligible to all except recipient |
|
|
Term
|
Definition
Encrypted information that is sent from sender to receiver |
|
|
Term
|
Definition
It is a boolean Operation, indicated by XOR or the symbol"O" with an x in the middle, easily implemented in hardware. Operates on the bit level |
|
|
Term
|
Definition
Information or sequence that controls enciphering and deciphering of message |
|
|
Term
|
Definition
- Each entity has key in common with two neighboring nodes. - Node 1 –Encrypts with key A - Node 2 – Decrypts with key A and encrypts with key B - Node 3 – Decrypts with Key B and encrypts with Key C |
|
|
Term
|
Definition
|
|
Term
|
Definition
Encryption with key K with components k1, k2,…kn, the encipherment uses each component of k to encrypt message M with components m1, m2,…mn. The Key is the same length as the Message and the Key is used only once, never again. Key must be completely random. It not considered not very practical. Invented 1917 by the US Army Signal Corps and AT&T |
|
|
Term
|
Definition
Secret communication of a message where communication is hidden. Example – last bit of each pixel in an image file contains bit of a message. |
|
|
Term
|
Definition
- Difficulty in recovering plain text from ciphertext as a factor of time and cost - Systems security is directly proportional to the work function - Work function should be commensurate with the value of the data |
|
|
Term
|
Definition
Used by Spartans in 400B.C., the user would wrap a message around wooden dowel. The diameter and length are the keys to the cipher. |
|
|
Term
|
Definition
Monoalphabetic substitution – only used one alphabet, specifically involved shifting the alphabet three letters. Known as C3 (Caesar shift 3 places). |
|
|
Term
|
Definition
Two concentric disks with letters on the edge that can be used to match up letters. |
|
|
Term
|
Definition
Arab philosopher who wrote a manuscript on Deciphering Cryptographic Messages |
|
|
Term
|
Definition
- 1790 developed device with 26 disks that could be rotated individually - Message would assembled by lining up the disks to the alignment bar - Then the bar was rotated a given angle and the resulting letters were the cipher text - The angle of rotation of the alignment bar was the key - Disks used extensively during the civil war |
|
|
Term
|
Definition
Shift the alphabet 13 places |
|
|
Term
|
Definition
Developed in 1920 by Boris Hagelin in Stockholm Sweden, known as the M-209 in the US |
|
|
Term
|
Definition
In 1920’ Herbert O. Yardley was in charge of U.S. MI-8. Cracked codes of a number of Nations. Gave U.S edge in Japanese negotiations in 1921-1922. U.S. State Department shut down MI-8. which upset Yardley, who then published book The American Black Chamber 1931. |
|
|
Term
|
Definition
Father of American Cryptology |
|
|
Term
|
Definition
William Friedman resumed cryptanalysis for U.S. Army after Yardley, broke the new Japanese cipher utilized by this machine for naval codes during World War II |
|
|
Term
|
Definition
- Polyalphabetic substitution cipher - using mechanical rotors - Developed in 1919 by Dutchman Arthur Scherbius obtained US Patent for Berlin firm - 1938 German went to six rings - Disks have 26 contacts on each side, to communicate with each neighboring disk one of them makes contact with the other disk - Also rotates the disks after encryption of each letter - Rotates next highest rotor like a “gas pump” – polyalphabetic |
|
|
Term
|
Definition
- German Enigma - Japanese Red - Japanese Purple - American SIGABA “Big Machine” |
|
|
Term
|
Definition
Key that are Private or Shared Secret |
|
|
Term
|
Definition
Public Key and Private Key |
|
|
Term
|
Definition
Cannot derive the private Key |
|
|
Term
|
Definition
Cryptography is 1,000 times faster than public key cryptography |
|
|
Term
Vigenere Polyalphabetic Cipher |
|
Definition
- Caesar is a subset of the Vigenere Polyalphabetic Cipher - Vigenere used 26 alphabets - Each letter of the message corresponds to a different alphabet - Subject to guessing the period, when the alphabet changes |
|
|
Term
|
Definition
Write the message vertically and read horizontally, can be attacked through frequency analysis |
|
|
Term
|
Definition
One time pad, random set of non-repeating characters |
|
|
Term
Book or Running Key Cipher |
|
Definition
- Using text from a book as the key and performing modulo26 addition on it. - Would use specific line and page number |
|
|
Term
|
Definition
Every X number of words within a text, is a part of the real message. |
|
|
Term
|
Definition
Used to detect copying of digital images |
|
|
Term
|
Definition
Symmetric Key based. - Sender and receiver both know the key - Encrypt and decrypt with the same key - Secret key should be changed frequently - Requires secure distribution of keys – by alternate channel - Ideally only used once - Secret Key Cryptosystem does have both public and private information - Public - Algorithm for enciphering plaintext - Possibly some plaintext and cipher text -Possibly encipherment of chosen plaintext - Private - The KEY -One cryptographic transformation out of many possible transformations - Large keys like >128 bit are very hard to break - Very fast - Sender requires different key for each receiver - Time stamps can be associated to the key so valid only during time window (counters replay) - No Authentication or repudiation - Best known is DES developed by IBM in 1970’s for commercial use |
|
|
Term
Data Encryption Standard (DES) |
|
Definition
- Uses confusion and diffusion - Derived in 1972 as derivation of Lucifer algorithm developed by Horst Fiestel at IBM - Patented in 1974 - Block Cipher Cryptographic System - Commercial and non-classified systems - Describes the Data Encryption Algorithm DEA - Federal Information Processing Standard FIPS 46-1 adopted in 1977 - Re-certified in 1993 by National Institute of Standards and Technology but will be replaced by AES Advanced Encryption Standard by Rijndael. - Uses 64 bit block size and 56 bit key, begins with 64 bit key and strips 8 parity bits - DEA is 16 round cryptosystem designed for implementation in hardware - 56 bit key = 256 or 70 quadrillion possible keys - Distributed systems can break it. U.S. Government no longer uses it - Triple DES – three encryptions using DEA are now being used until AES is adopted -Considered vulnerable by brute force search of the key – replaced by triple DES and AES |
|
|
Term
Modes that DES Operates in |
|
Definition
- Electronic Code Book (ECB) - Cipher Block Chaining (CBC) - Cipher Feedback (CFB) - Output Feedback (OFB) |
|
|
Term
|
Definition
Conceals statistical connection accomplished through s-boxes |
|
|
Term
|
Definition
Spreads the influence of plaintext character over many ciphertext characters, accomplished through p-boxes |
|
|
Term
Electronic Code Book (ECB) |
|
Definition
-Native encryption mode -Provides the recipe of substitutions and permutations that will be performed on the block of plaintext. -Data within a file does not have to be encrypted in a certain order. -Used for small amounts of data, like challenge-response, key management tasks. n Also used to encrypt PINs in ATM machines. |
|
|
Term
Cipher Block Chaining (CBC) |
|
Definition
-The previously generated ciphertext from the last encrypted block of data is inputted into the algorithm to generate random values. -These random values are processed with the current block of plaintext to create ciphertext. -This mode is used when encrypting individual characters is required. |
|
|
Term
|
Definition
-Functioning like a stream cipher by generating a stream of random binary bits to be combined with the plaintext to create ciphertext. -The ciphertext is fed back to the algorithm to form a portion of the next input to encrypt the next stream of bits. |
|
|
Term
|
Definition
-Double encryption is subject to meet in the middle attack -Encrypt on one end decrypt on the other and compare the values -So Triple DES is used -Can be done several different ways: DES – EDE2 (encrypt key 1, decrypt key 2, encrypt key 1) DES – EE2 (encrypt key 1, encrypt key 2, encrypt key 1) DES –EE3 (encrypt key 1, encrypt key 2, encrypt key 3) - most secure |
|
|
Term
|
Definition
-Resistance to all known attacks -Design Simplicity -Code compactness and speed on wide variety of platforms -Iterative block cipher with variable block length and key lengths that can be independently chosen as 128, 192 or 256 bits. -3.4 x 1038 possible 128 bit key combinations -6.2 x 1057 possible 192 bit key combinations -1.1 x 1077 possible 256 bit key combinations -Intermediate cipher result is called “state” that transformations operate on -Does not use Feistel transposition structure from DES -Uses round transformation of 3 layers -Non-linear layer -Linear mixing layer -Key addition layer -Suitable for High Speed Chips and compact co-processor on smart cards |
|
|
Term
|
Definition
-128 bit blocks in 16 rounds, up to 256 bit keys -Developed by Counterpane based on Blowfish (also by Counterpane) - Bruce Schnier -Employs whitening before first round and after second round -Need to break whitening keys in addition to Twofish key -Transposition |
|
|
Term
IDEA Cipher (International Data Encryption Algorithm) |
|
Definition
-64 bit block, 8 rounds, and 128 bit keys -Used in PGP -Much more difficult than DES |
|
|
Term
|
Definition
- Family of algorithms - Developed by Ronald Rivest in 1994 - 32, 64 or 128 bit blocks, up to 0 to 255 rounds, 0 to 2048 bit keys - RSA patented in 1997 |
|
|
Term
|
Definition
-Employee private and public key -Public made available to anyone wanting to encrypt a message -Private key is used to decrypt -Public Key cannot decrypt the message it encrypted -Ideally private key cannot be derived from the public key -The other can decrypt a message encrypted by one of the keys -Private key is kept private |
|
|
Term
|
Definition
- Rivest, Shamir and Addleman developed this algorithm - Based on difficulty of factoring a number which is the product of two large prime numbers, may be 200 digits each. - Can be used for Encryption, key exchange, and digital signatures |
|
|
Term
|
Definition
-Exchange secret keys over insecure medium without exposing keys -Without additional session key -Primarily key exchange -Based on difficulty of factoring a number which is the product of two large prime numbers, may be 200 digits each. -Can be used for Encryption, key exchange, and digital signatures |
|
|
Term
|
Definition
Extended Diffie-Hellman to include signatures and encryption |
|
|
Term
|
Definition
-Having set of items with fixed weights -Determining which items can be added in order to obtain a given total weight -Illustrated using Super increasing weights (all weights greater than sum of previous) |
|
|
Term
|
Definition
-Elliptic curve discrete logarithm are hard to compute than general discrete logarithm -Smaller key size same level of security -Elliptic curve key of 160 bits = RSA of 1024 bits -Suited to smart cards and wireless devices (less memory and processing) -Digital signatures, encryption and key management |
|
|
Term
Public Key Cryptosystem Algorithms |
|
Definition
RSA, El Gamal, Diffie-Hellman, Shnorrs signature Alogorithm, Elliptic Curve, Nybergrueppels Signature Algorithm |
|
|
Term
Asymmetric Key - Bit sizes |
|
Definition
512 bits 1792 bits 2304 bits |
|
|
Term
Symmetric Key - Bit sizes |
|
Definition
|
|
Term
|
Definition
Secure Hash Algorithm produces 160 bit digest if message is less than 2^64 bits. - It is computationally infeasible to find message from message digest - It is computationally infeasible to find to different messages with same message digest - Padding bits are added to message to make it a multiple of 512 |
|
|
Term
Hashed Message Authentication Code (HMAC) |
|
Definition
Uses key to generate a Message Authentication Code which is used as a checksum |
|
|
Term
|
Definition
Developed by Ronald Rivest in 1991, produces 128 bit message digest |
|
|
Term
Digital Signal Standard (DSS) and Secure Hash Standard (SHS) |
|
Definition
-Enables use of RSA digital signature algorithm or DSA –Digital Signature Algorithm (based on El Gamal) -Both use The Secure Hash Algorithm to compute message digest then processed by DSA to verify the signature. Message digest is used instead of the longer message because faster. |
|
|
Term
Purpose of Digital Signatures |
|
Definition
To detect unauthorized modifications and to authenticate identity and non-repudiation. |
|
|
Term
|
Definition
-Generates block of data smaller than the original data -One way hash functions 1)One way has produces fixed size output (digest) 2)No two messages will have same digest 3)One way no getting original file from hash 4)Message digest should be calculated using all of original files data -After message digest is calculated it is encrypted with senders private key -Receiver decrypts using senders public key, if it opens then it is from the sender. -Then receiver computes message digest of sent file if hash is the same it has not been modified |
|
|
Term
|
Definition
Try every possible combination |
|
|
Term
|
Definition
Attacker has copy of plain text and the associated ciphertext of several messages |
|
|
Term
|
Definition
The attacker has the plaintext and ciphertext and can choose the plaintext that gets encrypted. |
|
|
Term
Adaptive Chosen Plain Text |
|
Definition
Selection of plain text is altered based on previous results |
|
|
Term
|
Definition
The attacker has the ciphertext of several messages. Each of the messages has been encrypted using the same encryption algorithm. |
|
|
Term
|
Definition
Portions of the cipher text are selected for trial decryption while having access to plain text. The attacker can choose the ciphertext to be decrypted and has access to the resulting decrypted plaintext |
|
|
Term
Adaptive Chosen Ciphertext |
|
Definition
Chosen cipher text are selected for trial decryption where selection is based on previous results |
|
|
Term
|
Definition
The probability of two different messages having same message digest or finding two different messages that have the same message digest |
|
|
Term
|
Definition
For attacking double encryption from each end and comparing in the middle |
|
|
Term
|
Definition
Intercepting messages and forwarding on modified versions |
|
|
Term
|
Definition
Intercepting messages and forwarding on modified versions |
|
|
Term
Differential Cryptanalysis |
|
Definition
Private key cryptography looking at text pairs after encryption looking for differences |
|
|
Term
|
Definition
Using plain text and cipher text to generate a linear approximation of a portion of the key |
|
|
Term
Differential Linear Cryptanalysis |
|
Definition
Using both linear and differential approaches |
|
|
Term
|
Definition
Using mathematics to determine the prime factors of large numbers |
|
|
Term
|
Definition
Exploiting the lack of randomness in key generation |
|
|
Term
Approaches to Escrowed Encryption |
|
Definition
-Allowing law enforcement to obtain the keys to view peoples encrypted data -Escrow the key in two pieces with two trusted escrow agents -Court order to get both pieces -Clipper Chip – implemented in tamper proof hardware |
|
|
Term
Public Key Infrastructure - (PKI) |
|
Definition
Integration of digital signatures and certificates. Requires the following: 1)Digital Certificates 2)Certificate Authorities (CA) 3)Registrations Authorities 4)Policies and procedures 5)Certificate Revocation 6)Non-repudiation support 7)Timestamping 8)Lightweight Directory Access Protocol 9)Security Enabled Applications 10)Cross Certification |
|
|
Term
Certificate Authority (CA) |
|
Definition
Acts as a notary to bind the key to the person |
|
|
Term
Key Escrow using Public Key Cryptography |
|
Definition
- Private key is split and distributed - Can verify each portion of the key without joining - Created by Sylvio Micali, MIT |
|
|
Term
Key Management Components |
|
Definition
1)Key control 2)Key recovery 3)Key storage 4)Key retirement/destruction 5)Key Change 6)Key Generation 7)Key theft 8)Frequency of key use |
|
|
Term
Secure Multipurpose Internet Mail Extensions (S/MIME) |
|
Definition
-Adds secure services to messages in MIME format -Provides authentication through digital signatures -Follows Public Key Cryptography Standards (PKCS) -Uses X.509 Signatures |
|
|
Term
MIME Object Security Services (MOSS) |
|
Definition
-Provides flexibility by supporting different trust models -Uses MD5, RSA Public Key and DES -Permits identification outside of the X.509 Standard |
|
|
Term
Privacy Enhanced Mail (PEM) |
|
Definition
-Compliant with Public Key Cryptography Standards (PKCS) -Developed by consortium of Microsoft, Sun, and Novell -Triple DES-EDE – Symmetric Encryption -MD2 and MD5 Message Digest -RSA Public Key – signatures and key distribution -X.509 Certificates and formal CA |
|
|
Term
Pretty Good Privacy - PGP |
|
Definition
-Phil Zimmerman -Symmetric Cipher using IDEA -RSA is used for signatures and key distribution -No CA, uses “web of trust” -Users can certify each other |
|
|
Term
Message Authentication Code |
|
Definition
Check value derived from message contents |
|
|
Term
SET – Secure Electronic Transaction |
|
Definition
-Visa and Mastercard developed in 1997 -Encrypts the payment information -DES – Symmetric Encryption -RSA Public Key – signatures and key distribution |
|
|
Term
Secure Sockets Layer (SSL) |
|
Definition
-Developed by Netscape in 1994 -Uses public key to authenticate server to the client -Also provides option client to sever authentication -Supports RSA public Key Algorithms, IDEA, DES, and 3DES -Supports MD5 Hashing -HTTPS header -Resides between the application and TCP layer -Can be used by telnet, FTP, HTTP and e-mail protocols. -Based on X.509 |
|
|
Term
Transaction Layer Security |
|
Definition
|
|
Term
Internet Open Trading Protocol – (IOTP) |
|
Definition
-Aimed at consumer to business transaction -Flexible and future focused |
|
|
Term
|
Definition
-Smart cash card application -Proprietary encryption algorithm -Card is same as cash |
|
|
Term
Wireless Application Protocol |
|
Definition
Designed for mobile devices (PDA, Phones) |
|
|
Term
Wireless Transport Security Protocol (WTLS) |
|
Definition
Used by WAP, three classes Class 1 – Anonymous Authentication Class 2- Sever Authentication Class 3 – Two way client and server authentication |
|
|
Term
|
Definition
Where WTLS is decrypted and re-encrypted to SSL at the WAP gateway |
|
|
Term
|
Definition
Stripped down HTML, C-HTML can be displayed on standard browser. Is competing with WML from Japan |
|
|
Term
|
Definition
SSH-2; Remote access via encrypted tunnel. Client to server authentication. Comprised of Transport Layer protocol, User Authentication protocol, and Connection Protocol |
|
|
Term
IKE – Internet Key Exchange |
|
Definition
Used for key management with IPSEC |
|
|
Term
Internet Security and Key Management Protocol (ISAKMP) |
|
Definition
IKE protocol; phases for establishing relationship |
|
|
Term
Secure Key Exchange Mechanism – SKEME |
|
Definition
IKE protocol; secure exchange mechanism |
|
|
Term
|
Definition
IKE protocol; modes of operation needed to establish secure connection |
|
|
Term
|
Definition
-Provides encryption, access control, and non-repudiation over IP. -Two Main Protocols are 1)Authentication Header – integrity, authentication and non-repudiation 2)Encapsulating Security Payload – encryption, limited authentication -Security Association is required between two parties – one way connection - Comprised of Security Parameter Index – (SPI) – 32 bit identifier - Bi-directional communication requires two Security Associations |
|
|
Term
In VPN implementation IPSec can operate in... |
|
Definition
|
|
Term
|
Definition
Data and original IP header encrypted, new header is added |
|
|
Term
|
Definition
Data encrypted, header not |
|
|
Term
When using IPSEC Security Associations can be combined into bundles using... either |
|
Definition
Transport Adjacency and Iterated Tunneling |
|
|
Term
IPSEC uses MD5 and SHA for... |
|
Definition
|
|