4.1 - Cryptography Primer Flashcards
(27 cards)
What is Cryptography?
Converting communications into a form that can only be read by the intended recipient
What are Public Key Infrastructure (PKI)?
A system (consisting of programs, data formats, procedures, communication protocols, security policies) that uses digital certificates and public key encryption to secure communications and establish trust between entities
What are the 4 cryptographic solutions?
Encryption, hashing, digital signatures, and digital certifications
What is encryption?
Process of encoding information
Use case: Confidentiality
What is Hashing?
A one way function that turns a file or string of text into a unique digest of the message
Use case: Integrity
What are digital signatures?
A hash value encrypted using the sender’s private key
Use case: Sender authenticity and non-repudiation
What are digital certificates?
A digital object that is tied to a cryptographic key pair
Use case: authentication
What is a cipher?
A technique that transforms plaintext into cipher text and back to plaintext
What is plain text?
Human readable text
What is cipher text?
Encrypted/not human readable text
What is an algorithm
A mathematically complex modern cipher
What is a key (cryptovariable)?
A secret value used with an algorithm
What is a stream cipher?
An algorithm that works on one bit of data at a time using XOR
What is a block cipher?
An algorithm that works on blocks of data
What is a confusion?
Process of changing the values. Complex substitution functions are used to create confusion
What is a diffusion?
Process of changing the order. Sending bits through multiple rounds of transportation is used to create diffusion
What is a key space?
Number of possible key combinations
What is key stretching?
A technique to strengthen a weak key to protect against brute force attacks
What is a symmetric key?
A single shared key used for both encryption and decryption
What is an asymmetric key?
Two mathematically related keys are used for encryption and decryption. This has to be used as a pair
How can we ensure the secrecy of the keys?
Trusted platform module (TPM), secure enclave, hardware security module (HSM), key escrow
What is trusted platform module (TPM)
A hardware chip used for storing cryptographic keys and related information
What is secure enclave?
A seperate processor and microkerner used for storing and processing cryptographic keys and related information in moblie devices
What is hardware security module (HSM)?
Hardened, tamper resistant hardware devices that secure cryptographic keys and related information