Shared Flashcard Set

Details

Domain 4 - ISC2
CISSP Cryptography
115
Computer Science
Professional
07/13/2011

Additional Computer Science Flashcards

 


 

Cards

Term
Block Cipher
Definition
Breaks the plaintext into blocks and encrypts each with the same algorithm
Term
Cipher
Definition
Cryptographic transformation operates on the characters or bites
Term
Ciphertext
Definition
Unintelligible message, also know as a Cryptogram
Term
Clustering
Definition
Plaintext message generates identical ciphertext using the same algorithm but different keys
Term
Codes
Definition
A cryptographic transformation that operates at the word or phrase level
Term
Cryptanalysis
Definition
Act of obtaining plaintext or key from ciphertext
Term
Cryptographic Algorithm
Definition
Step-by-step procedure used to encipher plaintext and decipher ciphertext
Term
Cryptography
Definition
Art and Science of hiding the meaning of communication
Term
Cryptology
Definition
Encompasses cryptography and cryptanalysis
Term
Cryptosystem
Definition
Set of transformations from message space to ciphertext space
Term
Encipher
Definition
To make a message unintelligible to all except recipient
Term
End-to-end encryption
Definition
Encrypted information that is sent from sender to receiver
Term
Exclusive Or
Definition
It is a boolean Operation, indicated by XOR or the symbol"O" with an x in the middle, easily implemented in hardware. Operates on the bit level
Term
Key – cryptovariable
Definition
Information or sequence that controls enciphering and deciphering of message
Term
Link Encryption
Definition
- Each entity has key in common with two neighboring nodes.
- Node 1 –Encrypts with key A
- Node 2 – Decrypts with key A and encrypts with key B
- Node 3 – Decrypts with Key B and encrypts with Key C
Term
Plaintext
Definition
A message in clear text
Term
One time pad
Definition
Encryption with key K with components k1, k2,…kn, the encipherment uses each component of k to encrypt message M with components m1, m2,…mn. The Key is the same length as the Message and the Key is used only once, never again. Key must be completely random. It not considered not very practical. Invented 1917 by the US Army Signal Corps and AT&T
Term
Steganogrophy
Definition
Secret communication of a message where communication is hidden. Example – last bit of each pixel in an image file contains bit of a message.
Term
Work Function (Factor)
Definition
- Difficulty in recovering plain text from ciphertext as a factor of time and cost
- Systems security is directly proportional to the work function
- Work function should be commensurate with the value of the data
Term
Scytale
Definition
Used by Spartans in 400B.C., the user would wrap a message around wooden dowel. The diameter and length are the keys to the cipher.
Term
Caesar cipher
Definition
Monoalphabetic substitution – only used one alphabet, specifically involved shifting the alphabet three letters. Known as C3 (Caesar shift 3 places).
Term
Cipher Disks
Definition
Two concentric disks with letters on the edge that can be used to match up letters.
Term
Al-Kindi
Definition
Arab philosopher who wrote a manuscript on Deciphering Cryptographic Messages
Term
Thomas Jefferson
Definition
- 1790 developed device with 26 disks that could be rotated individually
- Message would assembled by lining up the disks to the alignment bar
- Then the bar was rotated a given angle and the resulting letters were the cipher text
- The angle of rotation of the alignment bar was the key
- Disks used extensively during the civil war
Term
UNIX – ROT13
Definition
Shift the alphabet 13 places
Term
Hagelin Machine
Definition
Developed in 1920 by Boris Hagelin in Stockholm Sweden, known as the M-209 in the US
Term
Black Chamber
Definition
In 1920’ Herbert O. Yardley was in charge of U.S. MI-8. Cracked codes of a number of Nations. Gave U.S edge in Japanese negotiations in 1921-1922. U.S. State Department shut down MI-8. which upset Yardley, who then published book The American Black Chamber 1931.
Term
Herbert O. Yardley
Definition
Father of American Cryptology
Term
Japanese Purple Machine
Definition
William Friedman resumed cryptanalysis for U.S. Army after Yardley, broke the new Japanese cipher utilized by this machine for naval codes during World War II
Term
German Enigma Machine
Definition
- Polyalphabetic substitution cipher - using mechanical rotors
- Developed in 1919 by Dutchman Arthur Scherbius obtained US Patent for Berlin firm
- 1938 German went to six rings
- Disks have 26 contacts on each side, to communicate with each neighboring disk one of them makes contact with the other disk
- Also rotates the disks after encryption of each letter
- Rotates next highest rotor like a “gas pump” – polyalphabetic
Term
Rotor Machines
Definition
- German Enigma
- Japanese Red
- Japanese Purple
- American SIGABA “Big Machine”
Term
Symmetric Key
Definition
Key that are Private or Shared Secret
Term
Asymmetric Key
Definition
Public Key and Private Key
Term
Public Key
Definition
Cannot derive the private Key
Term
Private Key
Definition
Cryptography is 1,000 times faster than public key cryptography
Term
Vigenere Polyalphabetic Cipher
Definition
- Caesar is a subset of the Vigenere Polyalphabetic Cipher
- Vigenere used 26 alphabets
- Each letter of the message corresponds to a different alphabet
- Subject to guessing the period, when the alphabet changes
Term
Columnar Transposition
Definition
Write the message vertically and read horizontally, can be attacked through frequency analysis
Term
Vernam Cipher
Definition
One time pad, random set of non-repeating characters
Term
Book or Running Key Cipher
Definition
- Using text from a book as the key and performing modulo26 addition on it.
- Would use specific line and page number
Term
Concealment cipher
Definition
Every X number of words within a text, is a part of the real message.
Term
Digital watermark
Definition
Used to detect copying of digital images
Term
Secret Key Cryptography
Definition
Symmetric Key based.
- Sender and receiver both know the key
- Encrypt and decrypt with the same key
- Secret key should be changed frequently
- Requires secure distribution of keys – by alternate channel
- Ideally only used once
- Secret Key Cryptosystem does have both public and private information
- Public
- Algorithm for enciphering plaintext
- Possibly some plaintext and cipher text
-Possibly encipherment of chosen plaintext
- Private
- The KEY
-One cryptographic transformation out of many possible transformations
- Large keys like >128 bit are very hard to break
- Very fast
- Sender requires different key for each receiver
- Time stamps can be associated to the key so valid only during time window (counters replay)
- No Authentication or repudiation
- Best known is DES developed by IBM in 1970’s for commercial use
Term
Data Encryption Standard (DES)
Definition
- Uses confusion and diffusion
- Derived in 1972 as derivation of Lucifer algorithm developed by Horst Fiestel at IBM
- Patented in 1974 - Block Cipher Cryptographic System
- Commercial and non-classified systems
- Describes the Data Encryption Algorithm DEA
- Federal Information Processing Standard FIPS 46-1 adopted in 1977
- Re-certified in 1993 by National Institute of Standards and Technology but will be replaced by AES Advanced Encryption Standard by Rijndael.
- Uses 64 bit block size and 56 bit key, begins with 64 bit key and strips 8 parity bits
- DEA is 16 round cryptosystem designed for implementation in hardware
- 56 bit key = 256 or 70 quadrillion possible keys
- Distributed systems can break it. U.S. Government no longer uses it
- Triple DES – three encryptions using DEA are now being used until AES is adopted
-Considered vulnerable by brute force search of the key – replaced by triple DES and AES
Term
Modes that DES Operates in
Definition
- Electronic Code Book (ECB)
- Cipher Block Chaining (CBC)
- Cipher Feedback (CFB)
- Output Feedback (OFB)
Term
Confusion
Definition
Conceals statistical connection accomplished through s-boxes
Term
Diffusion
Definition
Spreads the influence of plaintext character over many ciphertext characters, accomplished through p-boxes
Term
Electronic Code Book (ECB)
Definition
-Native encryption mode
-Provides the recipe of substitutions and permutations that will be performed on the block of plaintext.
-Data within a file does not have to be encrypted in a certain order.
-Used for small amounts of data, like challenge-response, key management tasks.
n Also used to encrypt PINs in ATM machines.
Term
Cipher Block Chaining (CBC)
Definition
-The previously generated ciphertext from the last encrypted block of data is inputted into the algorithm to generate random values.
-These random values are processed with the current block of plaintext to create ciphertext.
-This mode is used when encrypting individual characters is required.
Term
Output Feedback (OFB)
Definition
-Functioning like a stream cipher by generating a stream of random binary bits to be combined with the plaintext to create ciphertext.
-The ciphertext is fed back to the algorithm to form a portion of the next input to encrypt the next stream of bits.
Term
Triple DES
Definition
-Double encryption is subject to meet in the middle attack
-Encrypt on one end decrypt on the other and compare the values
-So Triple DES is used
-Can be done several different ways:
DES – EDE2 (encrypt key 1, decrypt key 2, encrypt key 1)
DES – EE2 (encrypt key 1, encrypt key 2, encrypt key 1)
DES –EE3 (encrypt key 1, encrypt key 2, encrypt key 3) - most secure
Term
Rijndael Block Cipher
Definition
-Resistance to all known attacks
-Design Simplicity
-Code compactness and speed on wide variety of platforms
-Iterative block cipher with variable block length and key lengths that can be independently chosen as 128, 192 or 256 bits.
-3.4 x 1038 possible 128 bit key combinations
-6.2 x 1057 possible 192 bit key combinations
-1.1 x 1077 possible 256 bit key combinations
-Intermediate cipher result is called “state” that transformations operate on
-Does not use Feistel transposition structure from DES
-Uses round transformation of 3 layers
-Non-linear layer
-Linear mixing layer
-Key addition layer
-Suitable for High Speed Chips and compact co-processor on smart cards
Term
Twofish
Definition
-128 bit blocks in 16 rounds, up to 256 bit keys
-Developed by Counterpane based on Blowfish (also by Counterpane) - Bruce Schnier
-Employs whitening before first round and after second round
-Need to break whitening keys in addition to Twofish key
-Transposition
Term
IDEA Cipher (International Data Encryption Algorithm)
Definition
-64 bit block, 8 rounds, and 128 bit keys
-Used in PGP
-Much more difficult than DES
Term
RC5
Definition
- Family of algorithms
- Developed by Ronald Rivest in 1994
- 32, 64 or 128 bit blocks, up to 0 to 255 rounds, 0 to 2048 bit keys
- RSA patented in 1997
Term
Public Key Cryptography
Definition
-Employee private and public key
-Public made available to anyone wanting to encrypt a message
-Private key is used to decrypt
-Public Key cannot decrypt the message it encrypted
-Ideally private key cannot be derived from the public key
-The other can decrypt a message encrypted by one of the keys
-Private key is kept private
Term
RSA
Definition
- Rivest, Shamir and Addleman developed this algorithm
- Based on difficulty of factoring a number which is the product of two large prime numbers, may be 200 digits each.
- Can be used for Encryption, key exchange, and digital signatures
Term
Diffie-Hellman
Definition
-Exchange secret keys over insecure medium without exposing keys
-Without additional session key
-Primarily key exchange
-Based on difficulty of factoring a number which is the product of two large prime numbers, may be 200 digits each.
-Can be used for Encryption, key exchange, and digital signatures
Term
El Gamal
Definition
Extended Diffie-Hellman to include signatures and encryption
Term
Merkle-Hellman Knapsack
Definition
-Having set of items with fixed weights
-Determining which items can be added in order to obtain a given total weight
-Illustrated using Super increasing weights (all weights greater than sum of previous)
Term
Elliptic Curve
Definition
-Elliptic curve discrete logarithm are hard to compute than general discrete logarithm
-Smaller key size same level of security
-Elliptic curve key of 160 bits = RSA of 1024 bits
-Suited to smart cards and wireless devices (less memory and processing)
-Digital signatures, encryption and key management
Term
Public Key Cryptosystem Algorithms
Definition
RSA, El Gamal, Diffie-Hellman, Shnorrs signature Alogorithm, Elliptic Curve, Nybergrueppels Signature Algorithm
Term
Asymmetric Key - Bit sizes
Definition
512 bits
1792 bits
2304 bits
Term
Symmetric Key - Bit sizes
Definition
64 bits
112 bits
128 bits
Term
SHA-1
Definition
Secure Hash Algorithm produces 160 bit digest if message is less than 2^64 bits.
- It is computationally infeasible to find message from message digest
- It is computationally infeasible to find to different messages with same message digest
- Padding bits are added to message to make it a multiple of 512
Term
Hashed Message Authentication Code (HMAC)
Definition
Uses key to generate a Message Authentication Code which is used as a checksum
Term
MD5
Definition
Developed by Ronald Rivest in 1991, produces 128 bit message digest
Term
Digital Signal Standard (DSS) and Secure Hash Standard (SHS)
Definition
-Enables use of RSA digital signature algorithm or DSA –Digital Signature Algorithm (based on El Gamal)
-Both use The Secure Hash Algorithm to compute message digest then processed by DSA to verify the signature. Message digest is used instead of the longer message because faster.
Term
Purpose of Digital Signatures
Definition
To detect unauthorized modifications and to authenticate identity and non-repudiation.
Term
Digital Signatures
Definition
-Generates block of data smaller than the original data
-One way hash functions
1)One way has produces fixed size output (digest)
2)No two messages will have same digest
3)One way no getting original file from hash
4)Message digest should be calculated using all of original files data
-After message digest is calculated it is encrypted with senders private key
-Receiver decrypts using senders public key, if it opens then it is from the sender.
-Then receiver computes message digest of sent file if hash is the same it has not been modified
Term
Brute Force Attack
Definition
Try every possible combination
Term
Known Plain Text
Definition
Attacker has copy of plain text and the associated ciphertext of several messages
Term
Chosen Plain Text
Definition
The attacker has the plaintext and ciphertext and can choose the plaintext that gets encrypted.
Term
Adaptive Chosen Plain Text
Definition
Selection of plain text is altered based on previous results
Term
Ciphertext Only
Definition
The attacker has the ciphertext of several messages. Each of the messages has been encrypted using the same encryption algorithm.
Term
Chosen Ciphertext
Definition
Portions of the cipher text are selected for trial decryption while having access to plain text. The attacker can choose the ciphertext to be decrypted and has access to the resulting decrypted plaintext
Term
Adaptive Chosen Ciphertext
Definition
Chosen cipher text are selected for trial decryption where selection is based on previous results
Term
Birthday Attack
Definition
The probability of two different messages having same message digest or finding two different messages that have the same message digest
Term
Meet in the Middle
Definition
For attacking double encryption from each end and comparing in the middle
Term
Man in the Middle
Definition
Intercepting messages and forwarding on modified versions
Term
Man in the Middle
Definition
Intercepting messages and forwarding on modified versions
Term
Differential Cryptanalysis
Definition
Private key cryptography looking at text pairs after encryption looking for differences
Term
Linear Cryptanalysis
Definition
Using plain text and cipher text to generate a linear approximation of a portion of the key
Term
Differential Linear Cryptanalysis
Definition
Using both linear and differential approaches
Term
Factoring
Definition
Using mathematics to determine the prime factors of large numbers
Term
Statistical
Definition
Exploiting the lack of randomness in key generation
Term
Approaches to Escrowed Encryption
Definition
-Allowing law enforcement to obtain the keys to view peoples encrypted data
-Escrow the key in two pieces with two trusted escrow agents
-Court order to get both pieces
-Clipper Chip – implemented in tamper proof hardware
Term
Public Key Infrastructure - (PKI)
Definition
Integration of digital signatures and certificates. Requires the following:
1)Digital Certificates
2)Certificate Authorities (CA)
3)Registrations Authorities
4)Policies and procedures
5)Certificate Revocation
6)Non-repudiation support
7)Timestamping
8)Lightweight Directory Access Protocol
9)Security Enabled Applications
10)Cross Certification
Term
Certificate Authority (CA)
Definition
Acts as a notary to bind the key to the person
Term
Key Escrow using Public Key Cryptography
Definition
- Private key is split and distributed
- Can verify each portion of the key without joining
- Created by Sylvio Micali, MIT
Term
Key Management Components
Definition
1)Key control
2)Key recovery
3)Key storage
4)Key retirement/destruction
5)Key Change
6)Key Generation
7)Key theft
8)Frequency of key use
Term
Secure Multipurpose Internet Mail Extensions (S/MIME)
Definition
-Adds secure services to messages in MIME format
-Provides authentication through digital signatures
-Follows Public Key Cryptography Standards (PKCS)
-Uses X.509 Signatures
Term
MIME Object Security Services (MOSS)
Definition
-Provides flexibility by supporting different trust models
-Uses MD5, RSA Public Key and DES
-Permits identification outside of the X.509 Standard
Term
Privacy Enhanced Mail (PEM)
Definition
-Compliant with Public Key Cryptography Standards (PKCS)
-Developed by consortium of Microsoft, Sun, and Novell
-Triple DES-EDE – Symmetric Encryption
-MD2 and MD5 Message Digest
-RSA Public Key – signatures and key distribution
-X.509 Certificates and formal CA
Term
Pretty Good Privacy - PGP
Definition
-Phil Zimmerman
-Symmetric Cipher using IDEA
-RSA is used for signatures and key distribution
-No CA, uses “web of trust”
-Users can certify each other
Term
Message Authentication Code
Definition
Check value derived from message contents
Term
SET – Secure Electronic Transaction
Definition
-Visa and Mastercard developed in 1997
-Encrypts the payment information
-DES – Symmetric Encryption
-RSA Public Key – signatures and key distribution
Term
Secure Sockets Layer (SSL)
Definition
-Developed by Netscape in 1994
-Uses public key to authenticate server to the client
-Also provides option client to sever authentication
-Supports RSA public Key Algorithms, IDEA, DES, and 3DES
-Supports MD5 Hashing
-HTTPS header
-Resides between the application and TCP layer
-Can be used by telnet, FTP, HTTP and e-mail protocols.
-Based on X.509
Term
Transaction Layer Security
Definition
Successor to SSL
Term
Internet Open Trading Protocol – (IOTP)
Definition
-Aimed at consumer to business transaction
-Flexible and future focused
Term
MONDEX
Definition
-Smart cash card application
-Proprietary encryption algorithm
-Card is same as cash
Term
Wireless Application Protocol
Definition
Designed for mobile devices (PDA, Phones)
Term
Wireless Transport Security Protocol (WTLS)
Definition
Used by WAP, three classes
Class 1 – Anonymous Authentication
Class 2- Sever Authentication
Class 3 – Two way client and server authentication
Term
WAP GAP
Definition
Where WTLS is decrypted and re-encrypted to SSL at the WAP gateway
Term
C-HTML
Definition
Stripped down HTML, C-HTML can be displayed on standard browser. Is competing with WML from Japan
Term
Secure Shell
Definition
SSH-2; Remote access via encrypted tunnel. Client to server authentication.
Comprised of Transport Layer protocol,
User Authentication protocol, and Connection Protocol
Term
IKE – Internet Key Exchange
Definition
Used for key management with IPSEC
Term
Internet Security and Key Management Protocol (ISAKMP)
Definition
IKE protocol; phases for establishing relationship
Term
Secure Key Exchange Mechanism – SKEME
Definition
IKE protocol; secure exchange mechanism
Term
Oakley
Definition
IKE protocol; modes of operation needed to establish secure connection
Term
IPSec
Definition
-Provides encryption, access control, and non-repudiation over IP.
-Two Main Protocols are
1)Authentication Header – integrity, authentication and non-repudiation
2)Encapsulating Security Payload – encryption, limited authentication
-Security Association is required between two parties – one way connection - Comprised of Security Parameter Index – (SPI) – 32 bit identifier
- Bi-directional communication requires two Security Associations
Term
In VPN implementation IPSec can operate in...
Definition
transport or tunnel mode
Term
Tunnel mode
Definition
Data and original IP header encrypted, new header is added
Term
Transport mode
Definition
Data encrypted, header not
Term
When using IPSEC Security Associations can be combined into bundles using... either
Definition
Transport Adjacency and Iterated Tunneling
Term
IPSEC uses MD5 and SHA for...
Definition
Integrity
Supporting users have an ad free experience!