B3P4 Flashcards

1
Q

Security refers to which 3 requirements

A

Integrity
Authentication
Confidentiality

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What does in integrity mean

A

the message is guaranteed not to have been changes by a 3rd party while in transit

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is meant by authentication

A

the received information is guaranteed to have come from the designated sender

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is meant by confidentiality

A

he contents of the communication are invisible to all except the intended recipient

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

How is integrity ensured

A

To check integrity, we use as hash.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

How does a hash work

A

To check integrity, we use as hash.
This is generated by the sender of a message by applying a hash function to the message
The hash, h, is simply a number. It is also called a message digest.
The hashing function, H, is a one way mathematical function
The hash is sent to the receiver together with the message
At the receiving end, the same hash function, H, is apply to the message which is compared to the received digest that was sent with the message
If they match, the integrity is assured.
If they do not, it has been tampered with.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is a person in the middle attack

A

A security attack in which a message is intercepted, modified and re-sent in such a way that the recipient is unaware of any malicious interception.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

How is authentication ensure

A

Uses keys that unlocks the message and also authenticates the message

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is a HMAC keyed hash message authentication code

A

the combination of a cryptographic hash and a secret key into a single algorithm

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

How is confidentiality ensured

A

Confidentiality is required to ensure contents of communication are invisible to all except the recipient
Achieved by encryption

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

An encrypted message cannot be read by the recipient without both…

A

The correct key

The encryption algorithm used by originator

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is symmetric encryption

A

use the same key for both encryption and decryption. The symmetric keys are usually referred to a secret keys and must be pre-shared

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is asymmetric encryption

A

uses different keys to encrypt/decrypt data. The key used for encryption need not to be kept secret, as a different key is used for decryption

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is Diffie-Hellman (DH) key exchange

A

An algorithm that enables each party in an exchange to locally generate an identical secret key without the need for information exchanged during the process to be secret. The secret key can then be used for encryption and authentication. The Diffie–Hellman algorithm is sometimes referred to as an algorithm for secret key exchange, although no secret key is exchanged.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly