Term
DES: Type and # of bits in key |
|
Definition
Symmetric algorithm / Block / 56 bit key |
|
|
Term
3DES: Type and # of bits in key |
|
Definition
Symmetric algorithm / Block / 168 bit key |
|
|
Term
AES: Type and # of bits in key |
|
Definition
Symmetric algorithm / Block 128, 192 or 256 bit keys |
|
|
Term
IDEA: Type and # of bits in key |
|
Definition
Symmetric algorithm / Block / 128 bit key |
|
|
Term
Twofish: Type and # of bits in key |
|
Definition
Symmetric algorithm / Block / 256 bit key |
|
|
Term
Symmetric Encryption AKA (2) |
|
Definition
|
|
Term
Symmetric Encryption drawbacks (2) |
|
Definition
Key sharing is complicated / scalability issue (too many keys needed) |
|
|
Term
Symmetric Encryption advantages (2) |
|
Definition
|
|
Term
Typical block size of symmetric key encryption |
|
Definition
|
|
Term
Block ciphers use these two methods to encrypt |
|
Definition
Substitution / Transposition |
|
|
Term
Name four Asymmetric Encryption types |
|
Definition
Diffie-Hellman, Elliptic Curve Cryptosystem (ECC), El Gamal, RSA |
|
|
Term
MD5 stands for / hash size / relevance |
|
Definition
Message Digest algorithm / 128 bit / declared vulnerable inĀ 2010 |
|
|
Term
SHA-1: hash size / relevance |
|
Definition
160 bits / determined vulnerable in 2005 but still widely used |
|
|
Term
SHA-2: hash size / relevance |
|
Definition
4 hash sizes depending on algorithm: 224, 256, 384, 512 bits / not widely used but replacement for SHA-1 |
|
|
Term
Hashing algorithm is vulnerable to what? Describe / frequency of success / prime example of use |
|
Definition
Collision attack: When 2 or more files create the same output / extremely rare / find another word (password) with the hash and use the other word to get into the system. |
|
|
Term
What is used to assist in a collision attack on a hash? |
|
Definition
|
|
Term
Hashes are primarily used for what? How? |
|
Definition
Integrity checking. If recalculation on the file shows a different hash than the original, the file cannot be trusted. |
|
|
Term
Name the encryption method which hides messages in plain sight? |
|
Definition
|
|
Term
What is current PKI world standard version number? |
|
Definition
|
|
Term
From what can the public key be retrieved? |
|
Definition
|
|
Term
Name the four primary cryptography attacks |
|
Definition
Known plaintext, Ciphertext-only, Replay attack, Chosen cipher |
|
|
Term
Name four avenues of encrypted communications |
|
Definition
Secure shell (SSH), Secure Socket Layer (SSL), Internet Protocol Security (IPSec), Point-to-point tunneling Protocol (PPTP) |
|
|
Term
|
Definition
Point-to-point tunneling Protocol |
|
|
Term
|
Definition
|
|
Term
|
Definition
|
|
Term
|
Definition
Internet Protocol Security |
|
|
Term
Do these two things to ensure your encryption is effectively uncrackable |
|
Definition
Use a large key / change the key on a regular basis |
|
|
Term
Encryption algorithms turn what into what |
|
Definition
Plaintext into ciphertext |
|
|
Term
This term is is applicable when both parties cannot deny the message was sent /received |
|
Definition
|
|
Term
In asymmetric encryption, what type of key is used for encryption? |
|
Definition
Public key (used for what in asymmetric encryption) |
|
|
Term
In asymmetric encryption, what type of key is used for decryption? |
|
Definition
Private key (used for what in asymmetric encryption) |
|
|
Term
Asymmetric algorithms solve what three problems? |
|
Definition
Scalability, key exchange issue, lack of non-repudiation in symmetric algorithms |
|
|
Term
This can be used to protect against collision attacks and rainbow tables / define |
|
Definition
|
|
Term
This term is used for the practice of trying every possible combination to break a code |
|
Definition
|
|
Term
|
Definition
If the key is smaller than the data, the cipher will be vulnerable to frequency attacks. |
|
|