CISSP Cryptography and Symmetric Key Algorithms

Descrição

Based on chapt 6 in CISSP Study Guide
Dani B
FlashCards por Dani B, atualizado more than 1 year ago
Dani B
Criado por Dani B quase 7 anos atrás
43
2

Resumo de Recurso

Questão Responda
What kind of cipher is the Caesar cipher? It is a substitution cipher
What are the four fundamental goals of cryptography? confidentiality, integrity, authentication, and nonrepudiation but not all cryptosystems are intended to achieve all four goals
What is the purpose of confidentiality? To ensure that data remains private while at rest or in transit
How may a cryptosystem enforce confidentiality? Through use of symmetric keys (shared secret key) or asymmetric keys (individual combinations of public and private keys for each user)
What is the purpose of integrity? Ensures that data is not altered without authorization
How to enforce integrity? Through the use of digital signatures
What is the purpose of authentication? To verify the claimed identity of system users
How is authentication enforced? Through use of a challenge-response authentication protocol
What is the purpose of nonrepudiation? Nonrepudiation provides assurance to the recipient that the message was originated by the sender and not an imposter. It also prevents the sender from denying that they sent the message (aka repudiating the message).
How is nonrepudiation enforced? Through the use of asymmetric cryptosystems
What is the Kerchoff principle? That a cryptographic system must remain secure even if everything is known about it except for the key
What is the difference between a private key and public key system? In a private key system all participants share a secret key, in the public key system each participant has their own pair of keys (one public and one private)
What are the logical operations that can be performed in boolean mathematics? AND, OR, NOT, EXCLUSIVE OR, MODULO
What is the importance of the Exclusive OR (XOR) function and how is it performed? XOR is the most commonly used in cryptographic applications. The XOR (⊕) returns a true value when only one of the input values is true.
How is the modulo function performed? The modulo function is also very important in cryptography. The modulo function (%) returns the remainder value after a division is performed.
What is a one-way function? A one-way function is a mathematical operation where it is significantly easier to operate in one direction but is near impossible to compute in the inverse direction.
What is nonce? Nonce (number used once) is a random number that acts as a placeholder variable in mathematical functions. The nonce must be unique each time it is used and it is intended to prevent unauthorized replay or reproduction.
What is initialization vector (IV)? It is a nonce used for data encryption. It is used only once in any session to avoid repetition of sequences in encrypted text. It is a random bit string that is the same length as the block size and is XORed with the message. It is used to create unique ciphertext every time the same message is encrypted using the same key.
What is zero-knowledge proof? Is a method by which one method can prove to another party that a statement is true without conveying any information other than the statement is true.
What is a transposition cipher? Transposition ciphers use an encryption algorithm to rearrange the letters of a plaintext message to form the ciphertext message.
What is a one-time pad? One-time pads is a powerful type of substitution cipher. They use a different substitution alphabet for each letter of the plaintext message.
What is a running key ciphers (aka book cipher)? A type of polyalphabetic substitution cipher in which a text is used to produce a very long keystream
How does symmetric key algorithms work? A shared secret encryption key
Symmetric key weaknesses: the need for a secure method of exchanging key, does not implement nonrepudiation, difficult for large groups to communicate using symmetric key cryptography, not scalable as each possible combination of users must share a private key, keys must be discarded as each time a participant leaves the group and then regenerated
Symmetric key strength symmetric key cryptography operates at high speed, often 1000x faster than asymmetric key algorithms
Formula to calculate the total number of keys required to completely connect n parties using symmetric cryptography
Major strengths of asymmetric key cryptography very scalable as adding new users will only require adding one key pair each, regeneration only required if a user's private key if it is compromised, provides integrity, authentication and nonrepudiation, key distribution is simple
Common hashing algorithms Message Digest 2 (MD2), Message Digest 5 (MD5), Secure Hash Algorithm (SHA-0, SHA-1, SHA-2), Hashed Message Authentication Code (HMAC)
Common symmetric cryptosystems Data Encryption Standard (DES), Triple DES (3DES), International Data Encryption Algorithm (IDEA), Blowfish, Skipjack, Advanced Encryption Standard (AES)
What is DES? Published by the US government as a standard cryptosystem. Flaws in the algorithm caused it to no longer be considered secure.
How does DES work? It is a 64-bit block cipher that has 5 modes of operation. The key used is 56 bits long (actually 64-bit but only 56 contain key info, the other 8 has verification info about the key). DES uses a long series of XOR operations to generate the ciphertext in 16 passes.
What are the 5 modes of operation in DES? Electronic Codebook mode (ECB), Cipher Block Chaining ode (CBC), Cipher Feedback mode (CFB), Output Feedback mode (OFB), Counter mode (CTR)
What is Zero-knowledge proof? A benefit of cryptography where one entity can prove knowledge of a fact to a third party without revealing the fact itself to that third party.
Nonce A nonce is a random number or variable only used once

Semelhante

Mecânica
Alessandra S.
Dicas para sobreviver a rotina cansativa de estudante
Malu Miralha
GRAMÁTICA da LÍNGUA PORTUGUESA
Viviana Veloso
CLASSIFICAÇÃO : OS CINCO REINOS
TAÍS DA CUNHA
Administração Geral e Pública - Receita Federal - Auditor Fiscal
Alessandra S.
Simulado Geral de contabilidade
Alessandra S.
LITERATURA: ROMANTISMO (INTRODUÇÃO)
GoConqr suporte .
Sala de Aula Invertida
GoConqr suporte .
2a Lei de Mendel
Andrea Barreto M. Da Poça
Filosofia
Kamila Vieira
Nisto Cremos-Prova Capítulo 1-10
Aldeniz Silva