701 - Chapter 10 Flashcards
(109 cards)
What provides assurances that data has not been modified? And what verifies whether #DATA has retained this?
Integrity…hash
What is a string of alpha numeric characters derived from performing a mathematical calculation on data such as a message, patch, or file? And what is special about this?
Hash… it cannot be reversed, engineered to re-create the original #DATA
What is a common hashing algorithm used today?
SHA-3
What ensures that data is only viewable by authorized users? And what are two methods to ensure this?
Confidentiality… encryption and access control
What scramble #DATA to make it un unreadable if intercepted? It normally includes an algorithm and a key.
Encryption
What form of encryption uses the same key to encrypt and decrypt?
Symmetric encryption
What type of cipher encrypts data one bit at a time? And which cipher encrypts’s data and blocks?
Stream…block
What encryption uses a public and private key created as a matched key pair?
Asymmetric encryption
Which encryption requires PKI to issue certificates?
Asymmetric encryption
And how do the private and public key work with asymmetric encryption?
Anything encrypted with the public key can only be decrypted with the matching private key and anything encrypted with the private key can only be decrypted with the matching public key
What provides a level of confidentiality by hiding #DATA within other files?
Steganography
What validates an identity?
Authentication
What prevents a party from successfully disputing having performed an action?
Non-repudiation
What provides authentication, non-reputation, and integrity?
A digital signature
What is one of the main differences between a hash and checksum?
A check sum is typically a small piece of data and is used to quickly verify the integrity of the data and they are not intended to be crypto graphically secure
What is an example of a check sum usage?
A 16 digit credit card, the last digit is a checksum and is used to verify that the first 15 numbers were entered correctly
What is a common hashing algorithm that is discouraged from being used as a cryptographic cash? And in what instances is it still in use today?
Message Digest 5 MD5… To verify the integrity of Files similar to a checksum
What does hash based message authentication code HMAC do that’s a little bit different than the other hashing algorithms?
It hashes using an initial hashing algorithm such as MD5 or SHA – 256, and then, using a secret key known only by the sender and receiver, it performs another hash
In addition to integrity, what does HMAC also provide? And what often uses HMAC?
Authenticity because only the sender and receiver know the secret key… IPSec and TLS
True or false hashing also encrypts the data?
False
Which hash helps solve the problem of an attacker intercepting and modifying the hash and the contents of the message or file? And how/why?
HMAC… through the use of a shared secret known only by the two parties exchanging the data
What hashing algorithm is recommended for password usage and why?
A strong algorithm such as SHA-3 with a salt…adding the salt protects against an attack against known common password hashes
What occurs when the hashing rhythm creates the same hash from different inputs? And which hashing algorithm is highly susceptible to this?
A hash collision…MD5
Which type of password attack attempts to guess the password of an online system?
Online attacks