6.1 Compare and contrast basic concepts of cryptography. Flashcards
Encryption gives you ______
Confidentiality
Digital Signatures give you __________
Non-repudiation
Hashing gives you _____
Integrity
Encryption definition
A cryptographic technique that converts data from plaintext (cleartext) into code (ciphertext)
Ciphers
A specific set of actions used to encrypt data
Cryptanalysis
The science of breaking codes and ciphers
One-way Function
Mathematical operation that easily produces an output for each possible combination of inputs but makes it impossible to retrieve input values
Symmetric Algorithms
A single, shared key, secret-key, private-key encryption.
Used to encrypt large sized bulk data.
**Encrypt and decrypt with the same shared, secret key.
to protect passwords they are _____ before being stored
HASHed
drawback to Symmetric Algorithms
Doesn’t scale well (Key Distribution)
Asymmetric Algorithms
a pair of public and private key.
uses public key to encrypt it
uses private key to decrypt
Private key
– Used by you to Decrypt messages to you
– Must keep private
– Never give out your Private Key
Public key
– Used by others to encrypt messages to you.
– Everyone you want to has access to your Public Key.
– Located on the CA
Public Key Infrastructure (PKI) pertains to two things for the test.
- Digital certificates used to verify websites
- Asymmetric encryption
Hashing
- Used to store passwords
- Used to verify INTEGRITY
- Also called Message digest, checksum, hash value
- Used in Digital Signatures
Nonce
imply a number that is used only once.
IV (Initialization Vector)
- A random number used in combination with a secret key as a means to encrypt data.
- Sometimes referred to as a nonce
Salt
A random string of data used to modify a password hash.
Elliptic Curve
ECC is a public-key cryptosystem based upon complex mathematical equations of elliptic curves.
ECC uses smaller key sizes than traditional public-key cryptosystem.
As a result, it is faster and consumes fewer resources, making it more ideal for mobile and wireless devices.
PAD a ______
Password
SALT a _____
HASH
ECC - Elliptic Curve
Used for CellPhones
on test question about the military going to the field and you must encrypt cell phones. What encryption standard are you going to use
SHA256
Key Exchange
Can use IKE - pre-existing VPN tunnel - IN-Band
Can setup a new VPN tunnnel just to send keys - ISAKMP - OUT-of-Band