Cryptographic Concepts Flashcards

1
Q

Digital Signatures

A

Encrypted Hash of Senders Private Key
supplies, Authentication, Non-repudiation and Integrity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Digital Signatures

A

Encrypted Hash of Senders Private Key
supplies, Authentication, Non-repudiation and Integrity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q
A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Digital Signatures

A

Encrypted hash of sender private key

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

DSS

A

Digital Signature Standard
SHA 2or 3 message softest in conjunction with 3 encryption algorithms; DSA, RSA, ECDSA

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Salting

A

Random data used for extra input to a hash. Reduced effectiveness for Rainbow Tables

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

ECC

A

Elliptic Curve Cryptography

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Symmetric

A

Shared secret key,
Poor scalability, easy distribution and non repudiation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Asymmetric

A

Public-Private keys
Scalability, easy distribution

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Asymmetric Key Use with data

A

Data:
To encrypt use recipients public key
Decrypt use your own private key
Signature:
Use your private key
Recipient uses public key

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Symmetric algorithm Use

A

For bulk encryption eg AES256

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Asymmetric Algorithm Use

A

Distribution of symmetric keys
Digital signatures, Non repudiation and key agreement
Eg. RSA, DSS, ECC

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Hash Use

A

Digital signatures
Pseudo-Random number generation
Integrity services

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Post Quantum Cryptography

A

New kinds of approaches using todays computers but will be resistant to quantum computers when they arrive

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Quantum Key Distribution

A

Transferring with photons of light and can’t be copied or intercepted

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

ECB

A

Electronic Codebook Mode
Block Cipher
Least secure- 64bit blocks with chosen key block repetitions will use same encrypted block

17
Q

CBC

A

Cipher Block Chaining
Each block is XORed with the block of cipher immediately preceding

18
Q

CTR

A

Uses an incrementing counter and errors do not propagate

19
Q

Blockchain

A

Distributed public ledger
Does not use intermediaries
Data chained with a block holding the hash for itself and that of the preceding
To create new, computer solves a puzzle and sends solution to the others participating in the chain

20
Q

Lightweight Cryptography

A

ECC (asymmetric) for low power devices
AES256 (symmetric) for military

21
Q

PFS

A

Perfect Forward Secrecy
Don’t use server’s private RSA key
ECDHE to exchange keys and move on
Cannot use the private key to decrypt
More computer power

22
Q

ECDHE

A

Elliptic Curve Diffie-Hellman Ephemeral
Used for perfect forward secrecy

23
Q

RSA

A

Rivest, Shamir & Adleman
One of oldest public (asymmetric) key cryptographic algorithms widely used for email and web

24
Q

XOR

A

Exclusive Or
2 bits identical = 0
2 bits different = 1

25
Q

SRTP

A

Secure Real Time Transfer Protocol
For voice and video
Uses AES, HMAC-SHA1

26
Q

NTPsec

A

Secure Network Time Protocol

27
Q

S/MIME

A

Secure Multipurpose Internet Mail Connections
Public key encryption and signing of content
PKI organisation required

28
Q

SSL/TLS

A

Secure Sockets Layer/ Transports Layer Security
Uses HTTPS, with private key on server to transfer symmetric session key.

29
Q

IPsec

A

Layer 3 authentication and encryption
AH (Authentication Header)
ESP (encapsulation security payload)

30
Q

FTPS/SFTP

A

FTPS uses SSL
SFTP uses SSH (better) and gives file , directory functionality, interrupt her

31
Q

SASL

A

Simple Authentication and Security Layer
Provides authentication with LDAP, Kerberos, Certificates

32
Q

How to secure DHCP?

A

In AD DHCP servers must be authorised
Switches can be configured with trusted interfaces
Distribution only allowed from trusted interfaces
Cisco call it DHCP Snooping