Overview
CIA Triad
Cryptography
Symmetric/Asymmetric
Emerging Issues
100

This was the first example of cryptography over 4000 years ago

Translation

100

Data which resides in a permanent location awaiting access

Data at rest

100

The system must not be required to be secret, and it must be able to fall into the hands of an enemy without inconvenience

The Kerckhoff Principle

100

Least secure DES mode

Electronic Codebook Mode

100

A digital database ledger that is distributed among the nodes of a peer-to-peer network

Blockchain

200

Encryption method that involves shifting the letters of the alphabet by a set amount

Caesar cipher

200

Data that is susceptible to eavesdropping

Data in motion

200

Primarily used for bulk encryption (archiving), relies on a shared key for encrypting/decrypting

Symmetric Key Algorithms

200

DES mode that increments the IV for each operation

Counter Mode

200

Layers of encryption prevent nodes in the relay chain from reading anything other than info needed to accept and forward the traffic

Perfect forward secrecy

300

Encryption method using a Vigenere Table and a key word

Polyalphabetic Substitution

300

An encrypted message digests, created upon transmission

Digital signature

300

Established the first standard key length of 56-bits

Data Encryption Standard

300

Keys can be split in half, so that two people must collaborate to re-create the entire key

Split knowledge

300

Enables complex mathematical operations to be performed on encrypted data without compromising the encryption

Homomorphic encryption

400

nafjre vf cnffjbeq

Password

400

An authentication method that involves asking a question

Challenge-response

400

Can provide integrity, authentication, and nonrepudiation

Asymmetric Key Algorithms

400

Symmetric key generation used when no physical exchange or public key infrastructure is available

Dillie-Hellman Algorithm

400

The counterpart in quantum computing to the binary digit or bit of classical computing

Qubit

500

A way to authenticate images

Water marking

500

The study of methods to defeat codes and ciphers

Cryptanalysis

500

The result of using a hash function on data

Message digest

500

The creation, distribution, storage, destruction, recovery, and escrow of secret keys

Key Management Practices

500

An attack model for cryptanalysis where the attacker has access to both the plaintext and its encrypted version

Known-plaintext Attack