Crypto U1, Basic Principles

Descrição

IYM002 (Unit 1 - basics) Mapa Mental sobre Crypto U1, Basic Principles, criado por jjanesko em 31-03-2013.
jjanesko
Mapa Mental por jjanesko, atualizado more than 1 year ago
jjanesko
Criado por jjanesko mais de 11 anos atrás
137
12

Resumo de Recurso

Crypto U1, Basic Principles
  1. Vocabulary: Quizlet flashcards, password: imy002 URL: http://quizlet.com/15532068/everyday-cryptography-chapter-1-flash-cards/

    Anotações:

    • Quizlet flashcards (http://quizlet.com/15532068/everyday-cryptography-chapter-1-flash-cards/) (tutor reviewed and approved) Password:  imy002 Vocabulary is used throughout the entire course.  This provides the formal definitions set in the first chapter.
    1. 3 issues to consider when contemplating use of cryptography
      1. cost
        1. monetary
          1. ease of use
            1. efficiency of operation
            2. strength
              1. appropriateness of use
              2. 3 different ways to maintain confidentiality of data
                1. encryption
                  1. steganography
                    1. access control
                    2. attacks
                      1. 3 standard assumptions about attackers ability
                        1. has access to all ciphertexts
                          1. has some corresponding plaintext and ciphertext pairs
                            1. knows encryption algorithm
                            2. 2 types of crypto algorithm "breaks"
                              1. method to find key
                                1. for example: exhaustive key search
                                  1. also known as a brute force attack
                                  2. for example: use statistical properties of plaintext language to help reverse engineer key
                                  3. weakness is found in algorithm and makes key unnecessary
                                  4. How an attacker knows when he/she has found the correct key
                                    1. apply key to known plaintext/ciphertext pairs
                                      1. Has knowledge of plaintext language.
                                        1. may have contextual information that gives a clue
                                        2. kinds of attacks
                                          1. exploiting short key length
                                            1. dictionary attacks
                                              1. exploiting key derivation process
                                                1. time memory tradeoff attacks
                                                  1. cryptographic primitive-specific attacs
                                                    1. birthday attacks
                                                      1. statistical attacks
                                                        1. differential and linear cryptanalysis
                                                        2. algorithm specific attacks
                                                          1. side channel attacks
                                                            1. timing attack
                                                              1. power analysis
                                                                1. fault analysis
                                                                  1. padding attacks
                                                                  2. academic

                                                                Semelhante

                                                                Crypto U4, Block Cipher, Cipher Feedback Mode (CFB)
                                                                jjanesko
                                                                Crypto U4, Block Cipher, Cipher Block Chaining Mode (CBC)
                                                                jjanesko
                                                                Crypto U3, Theoretical vs. Practical Security
                                                                jjanesko
                                                                Crypto U4, Stream Cipher
                                                                jjanesko
                                                                Crypto U4, Block Cipher, Electronic Codebook Mode (ECB)
                                                                jjanesko
                                                                Crypto U4, Block Cipher, Counter Mode
                                                                jjanesko
                                                                Crypto U2, Crypto design principles
                                                                jjanesko
                                                                Crypto U8, example dynamic password scheme
                                                                jjanesko
                                                                Crypto U10 (part 1), Key Management & Lifecycle
                                                                jjanesko
                                                                Crypto U10 (part 2), Key Management and Lifecycle
                                                                jjanesko
                                                                Crypto U8 (part 3), entity authentication
                                                                jjanesko