Podcast
Questions and Answers
Which type of attack involves observing the decrypted plaintext from chosen input ciphertext?
Which type of attack involves observing the decrypted plaintext from chosen input ciphertext?
- Side-channel attacks
- Brute-force attacks
- Chosen-ciphertext attacks (correct)
- Linear cryptanalysis
What directly influences the security of a cipher in relation to key management?
What directly influences the security of a cipher in relation to key management?
- The timing of encryption operations
- The complexity of the cryptographic algorithm
- The key size (correct)
- The implementation of the system
Which attack technique exploits the relationship between differences in input and output of a cipher?
Which attack technique exploits the relationship between differences in input and output of a cipher?
- Brute-force attacks
- Birthday attacks
- Chosen-ciphertext attacks
- Differential cryptanalysis (correct)
What is the main principle behind birthday attacks in cryptography?
What is the main principle behind birthday attacks in cryptography?
Which aspect is NOT a crucial part of effective key management in cryptographic systems?
Which aspect is NOT a crucial part of effective key management in cryptographic systems?
What operation is used to combine the keystream with plaintext in stream ciphers?
What operation is used to combine the keystream with plaintext in stream ciphers?
Which of the following best describes how block ciphers operate?
Which of the following best describes how block ciphers operate?
Which encryption method uses the same key for both encryption and decryption?
Which encryption method uses the same key for both encryption and decryption?
What type of cryptographic attack occurs when the attacker only has standard ciphertext?
What type of cryptographic attack occurs when the attacker only has standard ciphertext?
Which of the following is a security property unique to the Cipher Block Chaining (CBC) mode of operation?
Which of the following is a security property unique to the Cipher Block Chaining (CBC) mode of operation?
What is the main function of Message Authentication Codes (MACs)?
What is the main function of Message Authentication Codes (MACs)?
Which asymmetric-key cryptography example is primarily used for secure key exchange?
Which asymmetric-key cryptography example is primarily used for secure key exchange?
What distinguishes hash functions from traditional encryption methods?
What distinguishes hash functions from traditional encryption methods?
The hash value in bits for MD5 is _____?
The hash value in bits for MD5 is _____?
IPSec ______ mode involves encryption from gateway to gateway?
IPSec ______ mode involves encryption from gateway to gateway?
Chaskey is a lightweight cryptography method used for _____?
Chaskey is a lightweight cryptography method used for _____?
The minimum recommended key size to use with RC4 is _____ bits?
The minimum recommended key size to use with RC4 is _____ bits?
What has a block size of 64 bits and key size of 56 bits?
What has a block size of 64 bits and key size of 56 bits?
A(n) _____ is a collection of precomputed hash values of actual plaintext passwords?
A(n) _____ is a collection of precomputed hash values of actual plaintext passwords?
Which encryption method allows for a variable key size up to a maximum of _____ bits?
Which encryption method allows for a variable key size up to a maximum of _____ bits?
Key sizes used with the Advanced Encryption Standard (AES) include _____?
Key sizes used with the Advanced Encryption Standard (AES) include _____?
What is a primary function of One Time Passwords (OTP)?
What is a primary function of One Time Passwords (OTP)?
Which key method is used to establish a secure connection in SSL/TLS?
Which key method is used to establish a secure connection in SSL/TLS?
Which protocol number is assigned for the encapsulating security protocol (ESP) in IPSec?
Which protocol number is assigned for the encapsulating security protocol (ESP) in IPSec?
What do miners receive as a reward for their mining efforts in blockchain technology?
What do miners receive as a reward for their mining efforts in blockchain technology?
Ethereum and Hyperledger are considered common options for implementing _____.
Ethereum and Hyperledger are considered common options for implementing _____.
During which certificate management stage does validation occur?
During which certificate management stage does validation occur?
The Bifid cipher makes use of a grid to map letters into numeric values. What type of cipher is it?
The Bifid cipher makes use of a grid to map letters into numeric values. What type of cipher is it?
What is the main function of an Online Certificate Status Protocol (OCSP)?
What is the main function of an Online Certificate Status Protocol (OCSP)?
What is a defining characteristic of a 'Cut-and-paste' attack?
What is a defining characteristic of a 'Cut-and-paste' attack?
What is the block size for AES?
What is the block size for AES?
Which method allows government agents to potentially decrypt secure communication without the knowledge of the data owners?
Which method allows government agents to potentially decrypt secure communication without the knowledge of the data owners?
Which block cipher mode exposes AES to a copy-and-paste attack?
Which block cipher mode exposes AES to a copy-and-paste attack?
What is the key size for 3DES?
What is the key size for 3DES?
What key concept does the term 'gas' refer to in Ethereum applications?
What key concept does the term 'gas' refer to in Ethereum applications?
During what stage of certificate management does certificate expiration occur?
During what stage of certificate management does certificate expiration occur?
The Paillier cryptosystem supports _____ encryption.
The Paillier cryptosystem supports _____ encryption.
What is the primary function of hash algorithms like SHA1 and MD5?
What is the primary function of hash algorithms like SHA1 and MD5?
Which version of Elliptic Curve cryptography supports symmetric key exchange?
Which version of Elliptic Curve cryptography supports symmetric key exchange?
With NTLM, each character in a password is converted into _____.
With NTLM, each character in a password is converted into _____.
Which of the following best describes a 'Man-in-the-middle (MITM)' attack?
Which of the following best describes a 'Man-in-the-middle (MITM)' attack?
What does the term 'exhaustive search' refer to in cryptography?
What does the term 'exhaustive search' refer to in cryptography?
What does a digital certificate prove in HTTPS communications?
What does a digital certificate prove in HTTPS communications?
Which block cipher mode enables parallel processing of data blocks?
Which block cipher mode enables parallel processing of data blocks?
In symmetric cryptography, which aspect is better suited for real-time communications than asymmetric cryptography?
In symmetric cryptography, which aspect is better suited for real-time communications than asymmetric cryptography?
PKCS #5 is a standard used for _____.
PKCS #5 is a standard used for _____.
What initialization vector (IV) value does WPA-supported TKIP use?
What initialization vector (IV) value does WPA-supported TKIP use?
El Gamal is used for _____.
El Gamal is used for _____.
Which key should be shared or distributed to facilitate decryption in asymmetric cryptography?
Which key should be shared or distributed to facilitate decryption in asymmetric cryptography?
What is the purpose of block cipher modes in symmetric encryption?
What is the purpose of block cipher modes in symmetric encryption?
Which symmetric block cipher modes operate similarly to stream ciphers?
Which symmetric block cipher modes operate similarly to stream ciphers?
What component do symmetric block ciphers use to perform substitution during encryption?
What component do symmetric block ciphers use to perform substitution during encryption?
What is the block size of the PRESENT cipher?
What is the block size of the PRESENT cipher?
What is the key size used with Skipjack, a symmetric block cipher?
What is the key size used with Skipjack, a symmetric block cipher?
IDEA cipher has specific characteristics including a block size of 64 bits and a key size of 128 bits. Which of the following is true about it?
IDEA cipher has specific characteristics including a block size of 64 bits and a key size of 128 bits. Which of the following is true about it?
What type of cryptography uses a key pair for encryption and decryption?
What type of cryptography uses a key pair for encryption and decryption?
What is the block size used with RC5, a symmetric block cipher?
What is the block size used with RC5, a symmetric block cipher?
When encrypting data with symmetric cryptography, which key is typically exchanged?
When encrypting data with symmetric cryptography, which key is typically exchanged?
What is the minimum recommended key size when employing RC2?
What is the minimum recommended key size when employing RC2?
What is the maximum key size for the RC5 cipher?
What is the maximum key size for the RC5 cipher?
Which lightweight cryptography method is used for signing messages (MAC)?
Which lightweight cryptography method is used for signing messages (MAC)?
What implementation is optimized for low-power operations in embedded systems?
What implementation is optimized for low-power operations in embedded systems?
Which encoding scheme for x.509 certificates supports Base64 format?
Which encoding scheme for x.509 certificates supports Base64 format?
What type of cipher is Blowfish categorized as?
What type of cipher is Blowfish categorized as?
What is the block size used with XTEA?
What is the block size used with XTEA?
What is the IV length used in the WEP encryption standard?
What is the IV length used in the WEP encryption standard?
What cryptographic method involves creating a unique passcode based on a specific time period?
What cryptographic method involves creating a unique passcode based on a specific time period?
What must an entity generate to obtain a digital certificate?
What must an entity generate to obtain a digital certificate?
What defines a Mono-alphabetic substitution cipher?
What defines a Mono-alphabetic substitution cipher?
Which light-weight cryptographic cipher is optimized for hardware implementations?
Which light-weight cryptographic cipher is optimized for hardware implementations?
What unique capability does homomorphic encryption provide?
What unique capability does homomorphic encryption provide?
What key size is typically associated with WEP?
What key size is typically associated with WEP?
What type of encoding supports up to 65,536 characters?
What type of encoding supports up to 65,536 characters?
What is the main feature of symmetric block ciphers?
What is the main feature of symmetric block ciphers?
What is the primary risk associated with a collision in hashing?
What is the primary risk associated with a collision in hashing?
Which cipher is known for being unbreakable since it uses its cipher code only once?
Which cipher is known for being unbreakable since it uses its cipher code only once?
Flashcards
Chosen-ciphertext attack
Chosen-ciphertext attack
An attacker can choose ciphertext and observe the corresponding decrypted plaintext.
Brute-force attack
Brute-force attack
Trying every possible key until the correct one is found. The security of a cipher is directly proportional to the key size.
Birthday attack
Birthday attack
Exploits the probability of collisions when generating a large number of hash values.
Key management
Key management
Signup and view all the flashcards
Side-channel attack
Side-channel attack
Signup and view all the flashcards
What is cryptography?
What is cryptography?
Signup and view all the flashcards
What is a keystream?
What is a keystream?
Signup and view all the flashcards
What are block ciphers?
What are block ciphers?
Signup and view all the flashcards
What is symmetric-key cryptography?
What is symmetric-key cryptography?
Signup and view all the flashcards
What is asymmetric-key cryptography?
What is asymmetric-key cryptography?
Signup and view all the flashcards
What are Hash functions?
What are Hash functions?
Signup and view all the flashcards
What are stream ciphers?
What are stream ciphers?
Signup and view all the flashcards
What is a ciphertext-only attack?
What is a ciphertext-only attack?
Signup and view all the flashcards
MD5 hash size
MD5 hash size
Signup and view all the flashcards
Hashing input & output
Hashing input & output
Signup and view all the flashcards
SHA-1 hash size
SHA-1 hash size
Signup and view all the flashcards
MD4 hash size
MD4 hash size
Signup and view all the flashcards
IPSec Transport mode
IPSec Transport mode
Signup and view all the flashcards
IPSec Tunnel mode
IPSec Tunnel mode
Signup and view all the flashcards
Analyst visibility in IPSec
Analyst visibility in IPSec
Signup and view all the flashcards
Chaskey
Chaskey
Signup and view all the flashcards
Chaskey key size
Chaskey key size
Signup and view all the flashcards
Salt in hashing
Salt in hashing
Signup and view all the flashcards
RC4 minimum key size
RC4 minimum key size
Signup and view all the flashcards
RC4 key size range
RC4 key size range
Signup and view all the flashcards
DES characteristics
DES characteristics
Signup and view all the flashcards
Rainbow table
Rainbow table
Signup and view all the flashcards
3DES characteristics
3DES characteristics
Signup and view all the flashcards
AES key sizes
AES key sizes
Signup and view all the flashcards
AES block size
AES block size
Signup and view all the flashcards
Skipjack key size
Skipjack key size
Signup and view all the flashcards
Enocoro key & IV size
Enocoro key & IV size
Signup and view all the flashcards
Skipjack block size
Skipjack block size
Signup and view all the flashcards
Light-weight hashing algorithms
Light-weight hashing algorithms
Signup and view all the flashcards
IDEA characteristics
IDEA characteristics
Signup and view all the flashcards
RSA characteristics
RSA characteristics
Signup and view all the flashcards
Blowfish & Twofish
Blowfish & Twofish
Signup and view all the flashcards
RC5 characteristics
RC5 characteristics
Signup and view all the flashcards
Quark hash size
Quark hash size
Signup and view all the flashcards
XTEA block size
XTEA block size
Signup and view all the flashcards
XTEA key size
XTEA key size
Signup and view all the flashcards
Camelia
Camelia
Signup and view all the flashcards
RC6
RC6
Signup and view all the flashcards
RC2 minimum key size
RC2 minimum key size
Signup and view all the flashcards
Mickey v2 key & IV size
Mickey v2 key & IV size
Signup and view all the flashcards
RC4 type
RC4 type
Signup and view all the flashcards
CSR role
CSR role
Signup and view all the flashcards
What is the MD5 hash value size?
What is the MD5 hash value size?
Signup and view all the flashcards
What is the SHA-1 hash value size?
What is the SHA-1 hash value size?
Signup and view all the flashcards
What is IPSec Tunnel Mode?
What is IPSec Tunnel Mode?
Signup and view all the flashcards
What is IPSec Transport Mode?
What is IPSec Transport Mode?
Signup and view all the flashcards
What is Chaskey?
What is Chaskey?
Signup and view all the flashcards
What is salt in hashing?
What is salt in hashing?
Signup and view all the flashcards
What is the minimum recommended key size for RC4?
What is the minimum recommended key size for RC4?
Signup and view all the flashcards
What is the AES block size?
What is the AES block size?
Signup and view all the flashcards
Asymmetric cryptography
Asymmetric cryptography
Signup and view all the flashcards
Block cipher modes
Block cipher modes
Signup and view all the flashcards
CFB, OFB, & CTR modes
CFB, OFB, & CTR modes
Signup and view all the flashcards
S-boxes in ciphers
S-boxes in ciphers
Signup and view all the flashcards
PRESENT cipher
PRESENT cipher
Signup and view all the flashcards
Cramer-Shoup encryption
Cramer-Shoup encryption
Signup and view all the flashcards
Homomorphic encryption
Homomorphic encryption
Signup and view all the flashcards
TOTP
TOTP
Signup and view all the flashcards
PEM encoding
PEM encoding
Signup and view all the flashcards
Conventional cryptography devices
Conventional cryptography devices
Signup and view all the flashcards
Lightweight cryptography devices
Lightweight cryptography devices
Signup and view all the flashcards
HOTP
HOTP
Signup and view all the flashcards
SIMON cipher
SIMON cipher
Signup and view all the flashcards
SPECK cipher
SPECK cipher
Signup and view all the flashcards
ECC in RFID
ECC in RFID
Signup and view all the flashcards
Non-Cryptographic Hash
Non-Cryptographic Hash
Signup and view all the flashcards
One Time Password (OTP)
One Time Password (OTP)
Signup and view all the flashcards
IPSec Handshake Port
IPSec Handshake Port
Signup and view all the flashcards
ESP Protocol Number
ESP Protocol Number
Signup and view all the flashcards
AH Protocol Number
AH Protocol Number
Signup and view all the flashcards
Symmetric Key in SSL/TLS
Symmetric Key in SSL/TLS
Signup and view all the flashcards
Virtual Private Network (VPN)
Virtual Private Network (VPN)
Signup and view all the flashcards
Onion Routing
Onion Routing
Signup and view all the flashcards
Tor Network
Tor Network
Signup and view all the flashcards
Cryptography Fingerprinting
Cryptography Fingerprinting
Signup and view all the flashcards
Blockchain Block Frequency
Blockchain Block Frequency
Signup and view all the flashcards
Blockchain in Bitcoin
Blockchain in Bitcoin
Signup and view all the flashcards
Miners in Blockchain
Miners in Blockchain
Signup and view all the flashcards
Miner Rewards
Miner Rewards
Signup and view all the flashcards
Smart Contracts
Smart Contracts
Signup and view all the flashcards
Gas in Ethereum
Gas in Ethereum
Signup and view all the flashcards
NOBUS Backdoor
NOBUS Backdoor
Signup and view all the flashcards
Entropy
Entropy
Signup and view all the flashcards
Digital Signature
Digital Signature
Signup and view all the flashcards
PKCS #7
PKCS #7
Signup and view all the flashcards
PKCS #5
PKCS #5
Signup and view all the flashcards
El Gamal
El Gamal
Signup and view all the flashcards
ECB (Electronic Codebook)
ECB (Electronic Codebook)
Signup and view all the flashcards
CTR (Counter Mode)
CTR (Counter Mode)
Signup and view all the flashcards
LM Hash
LM Hash
Signup and view all the flashcards
TSP (Time-Stamp Protocol)
TSP (Time-Stamp Protocol)
Signup and view all the flashcards
Substitution Cipher
Substitution Cipher
Signup and view all the flashcards
IPSec
IPSec
Signup and view all the flashcards
What is the block size of AES?
What is the block size of AES?
Signup and view all the flashcards
What is the key size of Skipjack?
What is the key size of Skipjack?
Signup and view all the flashcards
What are the key and IV sizes for Enocoro?
What are the key and IV sizes for Enocoro?
Signup and view all the flashcards
What is the block size of Skipjack?
What is the block size of Skipjack?
Signup and view all the flashcards
What are some examples of light-weight hashing algorithms?
What are some examples of light-weight hashing algorithms?
Signup and view all the flashcards
What are some important features of IDEA?
What are some important features of IDEA?
Signup and view all the flashcards
What are key features of RSA?
What are key features of RSA?
Signup and view all the flashcards
What type of cipher are Blowfish and Twofish, and what key sizes do they use?
What type of cipher are Blowfish and Twofish, and what key sizes do they use?
Signup and view all the flashcards
What are some interesting features of RC5?
What are some interesting features of RC5?
Signup and view all the flashcards
What is the hash output size of Quark?
What is the hash output size of Quark?
Signup and view all the flashcards
What is the block size of XTEA?
What is the block size of XTEA?
Signup and view all the flashcards
What is the key size of XTEA?
What is the key size of XTEA?
Signup and view all the flashcards
What type of cipher is Camelia?
What type of cipher is Camelia?
Signup and view all the flashcards
What type of cipher is RC6?
What type of cipher is RC6?
Signup and view all the flashcards
What are the key and IV sizes of Mickey v2?
What are the key and IV sizes of Mickey v2?
Signup and view all the flashcards
What type of cipher is RC4?
What type of cipher is RC4?
Signup and view all the flashcards
What is a certificate signing request (CSR)?
What is a certificate signing request (CSR)?
Signup and view all the flashcards
What type of cipher is ChaCha?
What type of cipher is ChaCha?
Signup and view all the flashcards
What type of algorithms are RSA and DSA?
What type of algorithms are RSA and DSA?
Signup and view all the flashcards
What does Diffie-Hellman provide a method for?
What does Diffie-Hellman provide a method for?
Signup and view all the flashcards
What is Chaskey used for?
What is Chaskey used for?
Signup and view all the flashcards
What key size does WEP use?
What key size does WEP use?
Signup and view all the flashcards
What must an entity do to obtain a digital certificate?
What must an entity do to obtain a digital certificate?
Signup and view all the flashcards
What key size does WPA use?
What key size does WPA use?
Signup and view all the flashcards
What encryption method does WPA2 use?
What encryption method does WPA2 use?
Signup and view all the flashcards
What is Mono-alphabetic substitution?
What is Mono-alphabetic substitution?
Signup and view all the flashcards
What step does a Certificate Authority (CA) take before issuing a digital certificate?
What step does a Certificate Authority (CA) take before issuing a digital certificate?
Signup and view all the flashcards
What is Polyalphabetic substitution?
What is Polyalphabetic substitution?
Signup and view all the flashcards
What is the One-time pad?
What is the One-time pad?
Signup and view all the flashcards
What is ASCII encoding?
What is ASCII encoding?
Signup and view all the flashcards
What happens when two different inputs produce the same hash?
What happens when two different inputs produce the same hash?
Signup and view all the flashcards
What is UTF-16 encoding?
What is UTF-16 encoding?
Signup and view all the flashcards
What are the key and IV sizes of Trivium?
What are the key and IV sizes of Trivium?
Signup and view all the flashcards
What is a hardware security module (HSM)?
What is a hardware security module (HSM)?
Signup and view all the flashcards
What is a trusted platform module (TPM)?
What is a trusted platform module (TPM)?
Signup and view all the flashcards
What is HMAC?
What is HMAC?
Signup and view all the flashcards
What is a Symmetric cipher?
What is a Symmetric cipher?
Signup and view all the flashcards
What does the binary XOR operation do?
What does the binary XOR operation do?
Signup and view all the flashcards
What does the binary AND operation do?
What does the binary AND operation do?
Signup and view all the flashcards
What does the binary OR operation do?
What does the binary OR operation do?
Signup and view all the flashcards
What does the modulo operation (%) do?
What does the modulo operation (%) do?
Signup and view all the flashcards
What are the two main types of symmetric ciphers?
What are the two main types of symmetric ciphers?
Signup and view all the flashcards
Study Notes
Introduction to Cryptography
- Cryptography secures communication and data by transforming it into an unreadable format.
- Key techniques encode and decode information to protect confidentiality, integrity, and authenticity.
- Fundamental components include encryption/decryption algorithms and key management for secure communication.
Keystream
- A keystream is a pseudo-random bit sequence generated by a PRNG.
- Combining keystream with plaintext (XOR) creates ciphertext.
- Decryption uses the same keystream (XOR).
Block Ciphers
- Block ciphers encrypt fixed-size plaintext blocks independently.
- Common modes: Electronic Codebook (ECB), Cipher Block Chaining (CBC), Output Feedback (OFB), and Counter (CTR). Each mode has security properties. ECB is vulnerable to copy-and-paste attacks.
- Feistel networks use substitution-permutation networks (SPN).
Encryption Methods
-
Symmetric-key cryptography: Same key for encryption/decryption. Examples: AES, DES, Blowfish, Skipjack, IDEA, RC6, Camelia, 3DES.
- AES uses 128, 192, or 256 bit keys, operates in 128 bit blocks.
-
Asymmetric-key cryptography: (Public-key cryptography) Different keys for encryption/decryption. Examples: RSA, ECC, Diffie-Hellman, Cramer-Shoup.
-
Hash functions: Transform any-length input into a fixed-size hash. Crucial for message integrity. MD5 (128 bits), SHA-1 (160 bits), SHA-256 (256 bits are some examples), as well as non-cryptographic hashing solutions such as Bernstein, Buzhash, Cityhash, and Spookyhash. Quark produces 64 or 112 bit hash values. MD4 (128 bits).
-
Stream ciphers: Encrypt bit-by-bit using a keystream. RC4 (40, 128 bits max key size, min 40 bits recommended), ChaCha, Trivium, Rabbit, Mickey v2, Grain are examples. AES 128, 192, or 256 bits. Considered less secure than AES for modern use cases.
-
Message Authentication Codes (MACs): Generate unique codes for message integrity and authenticity. Chaskey (128-bit key), lightweight MAC.
-
Key exchange: Diffie-Hellman, Elliptic Curve (Elli) are used for key exchange. Supports symmetric key establishment.
Cryptographic Attacks
- Ciphertext-only attacks: Only ciphertext.
- Known-plaintext attacks: Known plaintext-ciphertext pairs.
- Chosen-plaintext attacks: Choose plaintext, observe ciphertexts.
- Chosen-ciphertext attacks: Choose ciphertext, observe plaintexts.
- Brute-force attacks: Try all possible keys.
- Other attacks: Differential cryptanalysis, linear cryptanalysis, side-channel attacks, birthday attacks, rainbow tables (precomputed hashes of passwords).
Key Management
- Key management is critical.
- Processes for generation, distribution, storage, and key management.
- Secure key exchange protocols are employed for safe key establishment.
Security Considerations
- System security depends on strong algorithms, keys, and implementation.
- Security protocols require careful design and implementation to defend against attacks.
- Algorithm selection should match security needs.
Specific Cryptographic Algorithms
- Block Cipher Modes: CFB, OFB, CTR can make a block cipher function like a stream cipher.
- DES (Data Encryption Standard): Block size 64 bits, key size 56 bits, 16 rounds.
- 3DES (Triple DES): Block size 64 bits, key size 112 bits, 48 rounds.
- AES (Advanced Encryption Standard): 128 bit blocks, 128, 192, or 256 bit keys
- RC5: Block sizes 32, 64, or 128 bits; variable key size (up to 2048 bits).
- RC2: Block size 64 bits; variable key size up to 128 bits, minimum key size 40 bits recommended.
- Skipjack: 80 bit key, 64 bit block size
- IDEA: 64 bit block size, 128 bit key size, >17 rounds.
- PRESENT: 64 bit block size; 80 or 128 bit key size, 32 rounds.
- XTEA: 64-bit block size, 128-bit key size.
- CLEFIA: 128-bit blocks; 128, 192, or 256-bit keys.
- SIMON/SPECK: Lightweight block ciphers, optimized for hardware/software respectively.
- Rabbit: Symmetric stream cipher, 128-bit key size, 64-bit initialization vector (IV).
- Trivium: Symmetric stream cipher, 80-bit key size, 80-bit IV.
Special Algorithms
- Chaskey: Lightweight cryptography method for signing messages (MAC), ~3,333 gates at 1MHz clock rate, 128-bit key.
- HMAC: Message Authentication Code (MAC) that verifies message integrity and authenticity (Hashes message with secret key).
- IPSec transport/tunnel modes: Transport mode: end-to-end encryption; tunnel mode: encryption gateway-to-gateway.
- Hashing: Variable input length, fixed output length; uses salt to improve security against collisions (128, 160, 256 bits for e.g. MD5,SHA-1, SHA-256 respectively).
- One-Time Pad: Unbreakable, uses cipher code only once.
- Message Authentication Codes (MACs): Verify message integrity and authenticity, based on secret key and the message itself.
- Certificates (x.509): .cer, PEM, DER formats for certificates.
- Certificate Signing Request (CSR): Entity creates CSR to obtain a certificate. Authority signs with private key before issuing.
- Hash collisions: Two different inputs producing same hash.
- Initialization Vectors (IVs): Used in block cipher operations; commonly used in CFB, OFB, CTR modes.
- Homomorphic encryption: Perform mathematical operations on ciphered values.
- Key escrow: Keeps backup copies of cryptographic keys, raising privacy concerns, a backdoor condition.
- Public-key cryptography: uses a key pair for encryption and decryption; one is public, the other is private.
- Password cracking tools: Rainbow tables: collection of precomputed hashes of passwords for cracking.
- One-Time Passwords (OTPs): HOTP (hashed), TOTP (timed) methods for generating unique passcodes (used with 1-time passwords).
- WEP, WPA, WPA2: Different Wi-Fi encryption standards using varying key sizes and ciphers (RC4, AES). WEP:40 bit RC4 key, WPA: 128 bit RC4, WPA2: AES (128-bit block cipher) in their respective implementations.
Hardware Security Modules (HSMs) and Trusted Platform Modules (TPMs):
- HSMs manage cryptographic keys and provide cryptographic processing within a secure environment.
- TPMs are dedicated hardware processors handling hardware-level encryption for full disk encryption.
Data Encoding
- ASCII encoding: 8-bit values, 256 characters range.
- UTF-16 encoding: 16-bit values, 65,536 characters/range.
Standard Cipher Suites
- Various standards are available such as WEP, WPA, WPA2 with their associated symmetric algorithms, keys, and Initialization Vectors (IVs). These have been implemented for security in networking (using RC4 and AES ciphers).
Additional notes
- Conventional cryptography: used on servers, desktops & smartphones.
- Light-weight cryptography: used within embedded systems, RFID, sensor networks.
- Quantum computers: potential for breaking existing algorithms (especially RSA) due to fast multiplication circuits.
- IPSec Handshake: UDP port 500.
Studying That Suits You
Use AI to generate personalized quizzes and flashcards to suit your learning preferences.