2 cissp ® Official Study Guide Eighth Edition


Know the requirements for successful use of a one-time pad



Download 19,3 Mb.
Pdf ko'rish
bet228/881
Sana08.04.2023
Hajmi19,3 Mb.
#925879
1   ...   224   225   226   227   228   229   230   231   ...   881
Bog'liq
(CISSP) Mike Chapple, James Michael Stewart, Darril Gibson - CISSP Official Study Guide-Sybex (2018)

Know the requirements for successful use of a one-time pad. 
For a one-time pad to be suc-
cessful, the key must be generated randomly without any known pattern. The key must be 
at least as long as the message to be encrypted. The pads must be protected against physical 
disclosure, and each pad must be used only one time and then discarded.
Understand the concept of zero-knowledge proof. 
Zero-knowledge proof is a communica-
tion concept. A specific type of information is exchanged, but no real data is transferred, as 
with digital signatures and digital certificates.
Understand split knowledge. 
Split knowledge means that the information or privilege 
required to perform an operation is divided among multiple users. This ensures that no 
single person has sufficient privileges to compromise the security of the environment. M of N 
Control is an example of split knowledge.
Understand work function (work factor). 
Work function, or work factor, is a way to 
measure the strength of a cryptography system by measuring the effort in terms of cost and/
or time to decrypt messages. Usually the time and effort required to perform a complete 
brute-force attack against an encryption system is what a work function rating represents. 
The security and protection offered by a cryptosystem is directly proportional to the value of 
its work function/factor.
Understand the importance of key security. 
Cryptographic keys provide the necessary ele-
ment of secrecy to a cryptosystem. Modern cryptosystems utilize keys that are at least 128 
bits long to provide adequate security. It’s generally agreed that the 56-bit key of the Data 
Encryption Standard (DES) is no longer sufficiently long to provide security.
Know the differences between symmetric and asymmetric cryptosystems. 
Symmetric key 
cryptosystems (or secret key cryptosystems) rely on the use of a shared secret key. They 
are much faster than asymmetric algorithms, but they lack support for scalability, easy key 
distribution, and nonrepudiation. Asymmetric cryptosystems use public-private key pairs for 
communication between parties but operate much more slowly than symmetric algorithms.


Written Lab 

Download 19,3 Mb.

Do'stlaringiz bilan baham:
1   ...   224   225   226   227   228   229   230   231   ...   881




Ma'lumotlar bazasi mualliflik huquqi bilan himoyalangan ©hozir.org 2024
ma'muriyatiga murojaat qiling

kiriting | ro'yxatdan o'tish
    Bosh sahifa
юртда тантана
Боғда битган
Бугун юртда
Эшитганлар жилманглар
Эшитмадим деманглар
битган бодомлар
Yangiariq tumani
qitish marakazi
Raqamli texnologiyalar
ilishida muhokamadan
tasdiqqa tavsiya
tavsiya etilgan
iqtisodiyot kafedrasi
steiermarkischen landesregierung
asarlaringizni yuboring
o'zingizning asarlaringizni
Iltimos faqat
faqat o'zingizning
steierm rkischen
landesregierung fachabteilung
rkischen landesregierung
hamshira loyihasi
loyihasi mavsum
faolyatining oqibatlari
asosiy adabiyotlar
fakulteti ahborot
ahborot havfsizligi
havfsizligi kafedrasi
fanidan bo’yicha
fakulteti iqtisodiyot
boshqaruv fakulteti
chiqarishda boshqaruv
ishlab chiqarishda
iqtisodiyot fakultet
multiservis tarmoqlari
fanidan asosiy
Uzbek fanidan
mavzulari potok
asosidagi multiservis
'aliyyil a'ziym
billahil 'aliyyil
illaa billahil
quvvata illaa
falah' deganida
Kompyuter savodxonligi
bo’yicha mustaqil
'alal falah'
Hayya 'alal
'alas soloh
Hayya 'alas
mavsum boyicha


yuklab olish