Please enable JavaScript.
Coggle requires JavaScript to display documents.
Domain 3, How to Remember? # #, False Positives by dust and contaminant #…
Domain 3
Cipher Terms
-
-
Avalanche Effect
If the input is slightly modified, the output should be significantly different
-
-
-
Attacks on Cryptography
-
-
Chosen-Plaintext Attack
Has plaintext and ciphertext, but can choose the plaintext that gets encrypted.
-
-
-
Linear Cryptanalysis
Used against block algorithms and is a type of known-plaintext attack. The more messages the attacker can use, the more effective this attack is.
Evaluates the input and output values for each S-box and evaluates the probability of input values ending up in a specific combination.
Weaknesses of Systems
-
-
-
Mobile Systems
Mitigating Stategies
-
Data encryption, idle timeout, remote wipe
Bluetooth, camera, and web restrictions
-
-
Symmetric Cryptography
-
-
-
-
Algorithms
-
-
-
-
-
AES
128, 192, & 256 block sizes
Asymmetric Cryptography
-
-
-
-
Algorithms
RSA
Used for digital signatures, key exchange, and encryption
-
-
-
CPUs
Pieces
Register
-
-
-
Special Registers
Hold program counter, stack pointer, and program status word
-
-
-
-
-
-
-
-
-
-
Fire Sensors
-
-
Ionization Smoke Sensor
-
If electrical charge is interrupted by smoke, alarm triggers
-
-
-
-
-
-
-
-
-
-
-
-
-
-
False Positives by dust and contaminant # #