8. Cryptographic Solutions Flashcards

1
Q

Symmetric

A

Uses Same key for encryption and decryption

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Asymmetric

A

Uses a pair of keys for encryption and decryption

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

DES
Triple DES
IDEA
AES
Blowfish
Twofish
Rivest Cipher

A

Symmetric Algorithms

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Diffie-Hellman
RSA
Elliptic Curve Cryptography

A

Asymmetric Algorithms

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

MD5
SHA Family
RIPEMD
HMAC

A

Hashing Algorithms

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Public Key Infrastructure (PKI)

A

Framework managing digital keys and certificates for secure data transfer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Digital Certificates

A

Electronic credentials verifying entity identity for secure communications

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Blockchain

A

Decentralized, immutable ledger ensuring data integrity and transparency

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Encryption Tools

A

TPM
HSM
Key Management Systems
Secure Enclave

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Obfuscation Methods

A

Steganography
Tokenization
Data Masking

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

3 Types of Cryptographic Attacks

A

Downgrade Attacks
Collision Attacks
Quantum Computing Threats

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Key Escrow

A

Storage of cryptographic keys in a secure, third-party location

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Root of Trust

A

Highest level of trust in certificate validation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Certificate Authority (CA)

A

Trusted third party that issues digital certificates

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Registration Authority (RA)

A

Request identifying information from the user and forwards certificate request up to the CA to create a digital certificate.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Certificate Signing Request (CSR)

A

A block of encoded text with information about the entity requesting the certificate

17
Q

Certificate Revocation List (CRL)

A

List of all digital certificates that the certificate authority has already revoked.

18
Q

Online Certificate Status Protocol (OCSP)

A

Determines certificate revocation status

19
Q

OCSP Stapling

A

Alternative to OCSP, Allows cert holder to get the OCSP record from the sever at regular intervals

20
Q

Public Key Pinning

A

Allows an HTTPS website to resist impersonation attacks from users who are trying to present fraudulent certificates

21
Q

CRYSTALS- Dilithium
FLACON
SPHINCS+

A

NIST selected post-quantum cryptography standards