Term
|
Definition
algorithms are used to generate a fixed-length value mathematically from a message. The most common * standards for cryptographic applications are the SHA and MD algorithms. |
|
|
Term
|
Definition
algorithm requires that receivers of the message use the same private key. This algorithms can be extremely secure. This method is widely implemented in governmental applications. |
|
|
Term
|
Definition
algorithms use a two-key method of encryption. The message is encrypted using the public key and decrypted using a second key or private key. The key is derived from the same algorithm. |
|
|
Term
confidentiality, integrity, authentication, and nonrepudiation. |
|
Definition
the primary objectives for using cryptographic systems. |
|
|
Term
DES (Data Encryption Standard) |
|
Definition
- Symmetric encryption algorithm
- Block cipher operating on 64-bit blocks
- Key length of 56 bits
- Now considered insecure |
|
|
Term
|
Definition
- Symmetric encryption algorithm
- Block cipher operating on 64-bit blocks
- Key length of 112 bits
- Considered secure
|
|
|
Term
AES (Advanced encryption standard): |
|
Definition
- Symmetric encryption algorithm - Block cipher operating on 128-bit blocks - Key length of 128, 192 or 256 bits - Considered secure - used to encrypt network communication, or hard drives. |
|
|
Term
|
Definition
- Symmetric encryption algorithm - Block cipher operating on 64-bit blocks - Key length of 21 and 448 bits - Now considered insecure |
|
|
Term
|
Definition
- Symmetric encryption algorithm - Block cipher operating on 128-bit blocks - Key length of 128, 192 or 256 bits - Considered secure |
|
|
Term
|
Definition
- Symmetric encryption algorithm - Stream cipher - Key length between 40 bits and 2048 bits - Now considered insecure - Used for network encryption WAP, WPA, SSL,TLS |
|
|
Term
PGP - Pretty Good Privacy |
|
Definition
uses public and private keys pairs to encrypt and digitally sign messages. |
|
|
Term
|
Definition
is an implementation of open PGP standards. |
|
|
Term
|
Definition
is a hashing algorithm that computers a digest from provided data. Any changes in the data will indicate the digest; thus, data integrity is attained. - Message digest is another term for hash - It produces a 128-bit hash - it is no longer recommended - SHA (1 or 2) are the recommended alternatives. |
|
|
Term
|
Definition
- It produces a 160-bit hash - it is no longer recommended |
|
|
Term
|
Definition
- It produces output of 224, 256, 384 and 512-bit hash - Consist of a family of six hush functions - Uses a mathematically similar approach to SHA-1 and MD5 |
|
|
Term
|
Definition
- Designed eventually to replace SHA-2 - Uses a completely different hash generation approach than SHA-2 - Produces hashes of user-selected fixed length |
|
|
Term
RIPEMD (Integrity Primitives Evaluation Message Digest) |
|
Definition
- Created as an alternative to government-sponsored hash functions - Produces 128, 160, 256 and 321-bit hashes - Contains flaws in the 128-bit version |
|
|
Term
HMAC (hash-based message authentication code) |
|
Definition
- uses a hashing algorithm along with a symmetric key. - Provides authentication and integrity Create and verify message authentication code by using a secret key in conjunction with a hash function |
|
|
Term
Approved DSS (Digital signature standards) Algorithms |
|
Definition
- Digital Signature Algorithm (DSA) - Rivest, Shamir, Adelman (RSA) Elliptic Curve Digital Signature Algorithm (ESDSA) |
|
|
Term
Online Certificate Status Protocol (OCSP) |
|
Definition
CAs provide a real-time service that allows users to verify that a certificate is not revoked |
|
|
Term
|
Definition
is a method used with OCSP, which allows a web server to provide information on the validity of its own certificate rather than needing to go to the certificate vendor. This is done by the web server essentially downloading the OCSP response from the certificate vendor in advance and providing that to browsers. |
|
|
Term
Certificate Revocation list (CRL) |
|
Definition
CAs provide a list of the serial numbers of revoked certificates |
|
|
Term
Extensible Authentication Protocol (EAP) |
|
Definition
a framework frequently used in wireless networks and point-to-point connections, framework with many variants, some secure, some no |
|
|
Term
|
Definition
insecure protocol that relies upon MS-CHAP |
|
|
Term
|
Definition
This protocol utilizes TLS in order to secure the authentication process. Most implementations of this protocol utilize X.509 digital certificates to authenticate the users. Cryptographic keys can be stored on smartcards. Smartcards are not stored on servers, they are used on client stations, normally with PIN |
|
|
Term
PEAP Protected Extensible Authentication Protocol |
|
Definition
Tunnels EAP inside an encrypted TLS session, creates secure channel for user authentication using a server side PKI certificate initially, then symmetric session key is used for the remainder of the session |
|
|
Term
EAP – FAST or Flexible Authentication via Secure Tunneling |
|
Definition
This protocol was proposed by Cisco as a replacement for the original EAP. this protocol establishes a TLS tunnel for authentication, but it does so using a Protected Access Credential (PAC). |
|
|
Term
PAP - Password Authentication Protocol |
|
Definition
should be disables when hardening VPNs, as it sends unencrypted passwords across the network during authentication |
|
|
Term
MS-CHAP v2 - Microsoft Challenge Handshake Authentication Protocol |
|
Definition
hashes credentials on both sides of a connection |
|
|
Term
|
Definition
hashes data on both sides of a connection similarly to CHAP |
|
|
Term
FTPS - File Transfer Protocol Secure |
|
Definition
can use Secure Sockets Layer (SSL) to secure FTP traffic |
|
|
Term
SFTP - Secure File Transfer Protocol |
|
Definition
refers tunneling FTP traffic through a Secure Shell (SSH) - encrypted session |
|
|
Term
ECC - Elliptic curve cryptography |
|
Definition
is public key cryptography based on points on an elliptic curve, does not use prime factorization |
|
|
Term
|
Definition
is a software package that uses encryption and relay nodes to facilitate anonymous Internet access. |
|
|
Term
|
Definition
is secure key exchange protocol used for asymmetric encryption and is provide through a cryptographic service provider, often in the form of an API library or module. Neither used for symmetric encryption nor is it a hashing algorithm |
|
|
Term
Elliptic Curve Diffie Hellman (ECDH): Diffie-Hellman Groups: - Large group number more secure - Secure group starts after Group 14 |
|
Definition
uses similar to DH approach but with elliptic curve problem |
|
|
Term
PBKDF2 (Password-Based Key Derivation Function 2) |
|
Definition
is part of PKCS #5 v. 2.01. It applies some function (like a hash or HMAC) to the password or passphrase along with Salt to produce a derived key. |
|
|
Term
|
Definition
is used with passwords, and it essentially uses a derivation of the Blowfish algorithm converted to a hashing algorithm to hash a password and add Salt to it |
|
|