Cryptography Flashcards

1
Q

MD5

A

Hash -

Message Digest - Hashing (128 bit)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

SHA

A

Hash -

SHA - Secure Hash Algorithm

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

SHA1

A

Hash -

SHA - Secure Hash Algorithm 160 bit

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

SHA2

A

Hash -

SHA - Secure Hash Algorithm. 128, 256, 384, 512

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

SHA3

A

Hash -

SHA - Secure Hash Algorithm

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

HMAC

A

Hash -

Hash-Based Message Authentication code. Uses a shared key to improve randomness.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

RIPEMD

A

Hash -
RACE Integrity Primitives Evaluation Message Digest
Used mostly for integrity.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

LANMAN

A

Older MS password hashing alg

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

NTLM

A

v2 is the current MS password hashing alg.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Encrypts data in specific block sizes

A

Block cipher

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Encrypts data on bit or byte at a time

A

Stream cipher

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Uses a different encryption key each time

A

Stream cipher

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

AES

A

Advanced Encrypting Standard - block cipher
Encrypts data in 128-bit blocks
Symetric

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Key size for AES-128

A

128 bits

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Key size for AES-256

A

256 bits

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Key size for AES-192

A

192 bits

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

DES

A

Data Encryption Standard - block cipher

Symetric

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Commonly used cipher that encrypts data in one pass.

A

AES

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

3DES

A

3DES - 3 passes to encrypt - block cipher

Symetric

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

RC4

A
Symmetric Stream Cipher - 
RC4 - Ron Rivest.
40 - 2,048 bit encryption.
Ron Rivest cipher.
Also known as ARC4
Recommended for SSL, TLS when encrypting HTTPS
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

ARC4

A

Same as RC4

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

Stream cipher used in WEP

A

RC4. Symmetric and reuses keys.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

Blowfish

A
Symmetric block cipher -
Strong 64-bit block cipher.  
Encrypts 64-bit blocks,
32 and 448-bit keys
Faster than AES
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

Twofish

A

Symmetric block cipher -
Strong 128-bit block cipher.
128, 192, 256 key lengths.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

OTP

A

One Time Pad
Been around since 1917
Identical pads. Each page has a key and a serial number.
Once the key is used, the page/key is destroyed.
Symetric

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

RSA

A
Asymmetric cipher -
Ron Vivest Adi Shamir
Used since 1997
Asymmetric
Used with key pairs.
Widely used in SSL/TLS handshakes.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

Keys that remain static over a long period of time.

A

Static Key

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

Keys that created for each session.

A

Ephemeral keys. Also called session keys.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

RCA uses this type of key

A

Static key

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q

How big is the block in AES?

A

128-bit block

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
31
Q

What are the possible AES key lengths?

A

128, 192, 256

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
32
Q

How big is the block in DES?

A

64-bit block

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
33
Q

What are the possible DES key lengths?

A

56-bit

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
34
Q

How big is the block in 3DES?

A

64-bit block

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
35
Q

What are the possible 3DES key lengths?

A

56, 112, 168

36
Q

How big is the block for Blowfish encryption?

A

64-bit

37
Q

What are the possible Blowfish key lengths?

A

32, 448

38
Q

How big is the block for Twofish encryption?

A

128-bit

39
Q

What are the possible key lengths for Twofish encryption?

A

128, 192, 256

40
Q

How big is the block for RC4 encryption?

A

RC4 is a streaming cipher.

41
Q

What are the possible key lengths for RC4?

A

40,2048

42
Q

bcrypt

A

Hash -
Based on Blowfish.
Used in Linux and Unix systems
Salts passwords before encrypting it with Blowfish

43
Q

PBKDF2

A

Hash -

Uses salts of at least 64 bits and a pseudo-random function such as HMAC to protect passwords.

44
Q

Argon2

A

Hash -

Winner of the Password Hashing Competition (PHC) in 2015 and is recommended to replace PBKDF2

45
Q

CRL

A

Certificate Revocation List

List of revoked certificates

46
Q

PGP

A

Pretty Good Privacy

47
Q

GPG

A

?

48
Q

CSR

A

Certificate Signing Request

49
Q

Perfect Forward Secrecy

A

Used with ephemeral keys in asymmetric encryption.
Different key is generated for each session.
Uses non-deterministic algorithm to ensure randomness. So the same input will generate a different output every time.

50
Q

Used with ephemeral keys in asymmetric encryption.
Different key is generated for each session.
Uses non-deterministic algorithm to ensure randomness. So the same input will generate a different output every time.

A

Perfect Forward Secrecy

51
Q

Elliptic Curve Cryptography

A

Cipher -
Uses less processing power so is often used on lower-powered devices.
Uses math to create a curve then plots points on the curve to create keys.
Tough to crack.

52
Q

Uses less processing power so is often used on lower-powered devices.
Uses math to create a curve then plots points on the curve to create keys.
Tough to crack.

A

Elliptic Curve Cryptography

53
Q

Diffie-Hellman

A

Key Exchange Algorithm
Used to privately share session keys.
RSA key exchanges

54
Q

Key Exchange Algorithm
Used to privately share session keys.
RSA key exchanges

A

Diffie-Hellman

55
Q

EDHE

A

Ephemeral DHE

56
Q

ECDHE

A

Elliptic Curve DHE

57
Q

Which key is used to digitally sign an email

A

Sender’s private key.

Recipient can decrypt signature with the public key to verify authenticity.

58
Q

I want to encrypt an email and send to a user. How do I keep my email private?

A

Encrypt with the recipient’s public key. Only they will be able to decrypt it with their private key.

59
Q

Digital Signature Algorithm (DSA)

A
Message is hashed with sender's private key.  Recipients can decrypt the hash with public key.
Provides:
Authentication
Non-repudiation
Integrity
60
Q

S/MIME

A

Secure Multipurpose Internet Mail Extensions.
Most popular standards do sign and encrypt email.
Uses RSA asymmetric encryption along with AES to dfo the encryption.
Uses RSA to it would require some sort of PKI.

61
Q

Most popular standards do sign and encrypt email.

A

S/MIME

62
Q

PBP/GPG

A

Pretty Good Privacy/GNU Privacy Guard
Can sign, encrypt and decrypt email.
Works much like S/MIME
Open Source…Free

63
Q

Attack that forces the use of weaker encryption by tricking the server to report it doesn’t support the better standards

A

Downgrade Attack

64
Q

Downgrade Attack

A

Attack that forces the use of weaker encryption by tricking the server to report it doesn’t support the better standards

65
Q

A group of technologies used t request, create, manage, store, distribute and revoke digital certificates.

A

PKI Components

66
Q

What allows entities on the internet to communicate for the 1st time over the internet securely?

A

PKI

67
Q

A trusted entity that issues, manages, validates and revokes certificates.

A

Certificate Authority (CA)

68
Q

Certificate Authority (CA)

A

A trusted entity that issues, manages, validates and revokes certificates.

69
Q

The process of placing a copy of all private keys in a safe environment.

A

Key Escrow

70
Q

Key Escrow

A

The process of placing a copy of all private keys in a safe environment.

71
Q

Recovery Agent

A

An individual who is designated to recover cryptographic keys including an organization’s private keys.

72
Q

An individual who is designated to recover cryptographic keys including an organization’s private keys.

A

Recovery Agent

73
Q

Type of certificate used to ID computer on a domain.

A

Machine/Computer certificate

74
Q

Machine/Computer certificate

A

Type of certificate used to ID computer on a domain.

75
Q

Certificate often used for users’ smart cards, EFS and other personnel uses.

A

User Certificate

76
Q

User Certificate

A

Certificate often used for users’ smart cards, EFS and other personnel uses.

77
Q

Certificate used to sign and/or encrypt emails.

A

Email Certificate

78
Q

Email Certificate

A

Certificate used to sign and/or encrypt emails.

79
Q

Certificate used for signing code.

A

Code signing certificate.

80
Q

Code signing certificate.

A

Certificate used for signing code.

81
Q

Type of certificate not issued by any trusted CA. Created by private CA.

A

Self-signed certificates

82
Q

Can be used for multiple domains or child domains. Domains must have the same root domain. Uses a * wildcard.

A

Wildcard certificate

83
Q

Wildcard certificate

A

Can be used for multiple domains or child domains. Domains must have the same root domain. Uses a * wildcard.

84
Q

Used for trusting multiple domains with different root names but owned by the same organization.

A

Subject Alternative Name (SAN)

85
Q

Subject Alternative Name (SAN)

A

Used for trusting multiple domains with different root names but owned by the same organization.

86
Q

X.509 v3

A

Certificate formats