CCISP Cryptology Definitions.docx - CCISP Cryptology...

This preview shows page 1 - 4 out of 13 pages.

The preview shows page 2 - 4 out of 13 pages.
CCISP Cryptology DefinitionsAddRoundKeyAddRoundKey is the final function applied in each round. It XORS the State withthe subkey. The subkey is derived from the key, and is different for each roundof AES.Advanced Encryption Standard AESAES uses 128-bit with 10 rounds of encryption, 192-bit 12 rounds of encryption,or 256-bit 14 rounds of encryption keys to encrypt 128-bit blocks of data.Advanced Encryption Standard AESRijndael was chosen and became AES. The name, is a combination of theauthors' names: Rijmen and Daemen. Rijndael was chosen "because it had thebest combination of security, performance, efficiency, and flexibility.Advanced Encryption Standard AESThe Advanced Encryption Standard is the current United States standardsymmetric block cipher.AES functionsAES has four functions: SubBytes, ShiftRows, MixColumns, and AddRoundKey.Asymmetric Encryptionencryption that uses two keys: if you encrypt withone you may decrypt with the otherAsymmetric encryptionuses two keys: if you encrypt with one key, you may decrypt with the other. Onekey may be made public called the public key; asymmetric encryption is alsocalled public key encryption for this reason.Asymmetric encryption
is far slower than symmetric encryption, and is alsoweaker per bit of key length. The strength of asymmetric encryption is theability to securely communicate without presharing a key.Asymmetric encryption - Public keyAnyone who wants to communicate with you downloads your public key anduses it to encrypt their plaintext. Once encrypted,only your private key can decrypt the plaintext. The private key must remainsecure.Asymmetric encryption - Public keyany message encrypted with the private key may be decrypted with the publickey. This is typically used for digital signaturesAsymmetric Methods - one way functionone-way functions are easy to compute one way and difficult to compute in thereverse direction. They should not be confused with one way hashing.Authentication Header AHAuthentication Header provides authentication and integrity for each packet ofnetwork data.Birthday AttackThe birthday attack is named after the birthday paradox. The name is based onfact that in a room with 23 people or more, the odds are greater than 50% thattwo will share the same birthday.BlowfishIs a symmetric block cipher. Blowfish uses from 32 through 448 bit keys toencrypt 64 bits of data. The default is 128 bit key.Brute ForceUses every possible key to decrypt the message. With proper computingresources the key will unlock the cipher. It is effective.Certificate Authorities
May be private or public such as Verisign or ThawteCertificate AuthoritiesDigital certificates are issued by Certificate Authorities (CAs), which authenticatethe identity of a person or organization before issuing a certificate to themCertificate Revocation ListsThe Certification Authorities maintain Certificate Revocation Lists CRL, which,asthe name implies, list certificates that have been revoked. A certificate may be

Upload your study docs or become a

Course Hero member to access this document

Upload your study docs or become a

Course Hero member to access this document

End of preview. Want to read all 13 pages?

Upload your study docs or become a

Course Hero member to access this document

Term
Fall
Professor
N/A
Tags
Cryptography, Encryption, symmetric block cipher

  • Left Quote Icon

    Student Picture

  • Left Quote Icon

    Student Picture

  • Left Quote Icon

    Student Picture