Module 16 Flashcards
Basic Integrity and Authenticity
Four elements of secure communications
Data Integrity
Origin Authentication
Data Confidentiality
Data Non-Repudiation
Data integrity
Guarantees that the message was not altered. Any changes to data in transit will be detected.
How is integrity ensured?
By implementing either of the Secure Hash Algorithms (SHA-2 or SHA-3)
Why should MD5 be avoided?
It is inherently insecure and creates vulnerabilities in a network
Origin Authentication
Guarantees that the message is not a forgery and does actually come from whom it states
How do most modern networks ensure authentication?
Hash-based message authentication code (HMAC)
Data Confidentiality
Guarantees that only authorized users can read the message. If the message is intercepted, it cannot be deciphered within a reasonable amount of time
How is Data confidentiality implemented?
Using symmetric and symmetric encryption algorithms
Data Non-Repudiation
Guarantees that the sender cannot repudiate, or refute, the validity of a message sent
What does Non-repudiation rely on?
The fact that only the sender has the unique characteristics or signature for how that message is treated
Cryptography can be used almost anywhere
True
Hashes
Used to verify and ensure data integrity and authentication
What is hashing based on?
One-way mathematical function that is relatively easy to compute, but harder to reverse
What is a resulting hash sometimes called?
Message digest
Digest
Digital fingerprint
What is not possible with hash functions?
Two different sets of data having the same hash output