Lesson 15 Flashcards

1
Q

Symmetric-key Cryptography

Also known as:

A

secret key or symmetric key encryption.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Modern symmetric ciphers are known as ________because they involve multiple rounds where each round is made up of simple ciphers

A

round ciphers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

_________ divide plaintext into blocks and use the same key for encryption and decryption.

A

Block ciphers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Three modern symmetric key ciphers are

A

DES, 3DES, AES

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

asymmetric key encryption

also known as

A

Public/private key encryption

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Diffie - Hellman is a ___________ used to encrypt and decrypt ___________ over a public channel between two parties that have no prior knowledge of each other and was one of the first public - key protocols.

A

public - key cryptosystem

symmetric keys

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

The _________ algorithm generates persistent asymmetric keys that can be used for encryption, digital signatures, and so on.

A

RSA Signature

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

cryptographic hash

AKA

A

To get authentication and non - repudiation, (and data integrity),

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Hash Algorithms

A

MD5, SHA-1 and 2

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

IPsec Protocols

A

ESP and AH

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Five Steps of IPsec

A

Interesting traffic:
IKE Phase 1: negotiate an IKE security policy (Secure channel)
IKE Phase 2: negotiate an IPsec security policy (Secure data)
Data Transfer
Tunnel terminated

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

An __ is simply the bundle of algorithms and parameters that is being used to encrypt and authenticate a particular flow in one direction. Therefore, in normal bi - directional traffic, the flows are secured by a pair of security associations.

A

Security Associations (SA)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly