Module 17 Flashcards

Public Key Cryptography

1
Q

Digital signatures

A

A mathematical technique used to provide authenticity, integrity, and nonrepudiation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

How do digital signatures serve as legal proof?

A

They provide nonrepudiation of transactions therefore proving that the data exchange did take place

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What type of cryptography do digital signatures use?

A

Asymmetric cryptography

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Authentic signatures

A

The signature cannot be forged and provides proof that the signer, and no one else signed the document

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Unalterable signatures

A

After a document is signed, it cannot be altered

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Not Reusable

A

The document signature cannot be transferred to another document

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Non-repudiated

A

The signed document is considered to be the same as a physical document. The signature is proof that the document has been signed by the actual person

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Code signing

A

Used for data integrity and authentication purposes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

How is code signing used?

A

To verify the integrity of executable files downloaded from a vendor website

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What does code signing use?

A

Digital certificates to authenticate and verify the identity of the site that is the source of the files

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Digital certificates

A

These are similar to a virtual ID card and used to authenticate the identity of system with a vendor website and establish an encrypted connection to exchange data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What are the three Digital Signature Standard (DSS)

A

Digital Signature Algorithm (DSA)
Rivest-Sharmir Adelman Algorithm (RSA)
Elliptic Curve Digital Signature Algorithm (ECDSA)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Digital Signature Algorithm (DSA)

A

DSA is the original standard for generating public and private key pairs, and for generating and verifying digital signatures

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Rivest-Shamir Adelman Algorithm (RSA)

A

RSA is an asymmetric algorithm that is commonly used for generating and verifying digital signatures

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Elliptic Curve Digital Signature Algorithm (ECDSA)

A

ECDSA is a newer variant of DSA and provides digital signature authentication and non-repudiation with the added benefits for computational efficiency, small signature sizes, and minimal bandwidth

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Digitally signing code provides several assurances about the code:

A

The code is authentic and is actually sourced by the publisher
The code has not been modified since it left the software publisher
The publisher undeniably punished the code. This provides non-repudiation of the act of publishing

17
Q

Digital certificate

A

Equivalent to an electronic passport

18
Q

What does a digital certificate do?

A

It enables users, hosts, and organizations to securely exchange information over the internet

19
Q
A