ch4 Flashcards
(26 cards)
What is the role of the Public Key?
To encrypt data and validate digital signatures
What is the primary function of the private key
Decryption
Trusted third party that can retrieve a key in emergancy scenarios
Key Escrow
A specialized hardware device designed to provide robust security measures for the security of security keys, sensitive data and cyrptographic operations
(HSM) Hardware security moduel
A robust security measure designed to protect the data on a hard drive or SSD
FDE - Full disk encryption
Chip that is critical in FDE on a disk
TPM Chip (Trusted platform)
The 4 steps of TLS (Transport layer Security)
- Handshake 2. Encryption 3. Transmisson 4. Decyption
Type of encyrption which uses both a public and private for data transfer
Asymentric encryption
Type of encryption which uses a single key to move data from point a to point b
Symentric encryption
The art securley delivering cryptogrpahic keys from sender to receiver
Key Exchange
Encryption that transforms plantext into a jumble of characters
Algorithms
Measure of a resistance against a keys length directly affects the complexity of deciphering encrypted data.
key length
The duration over which cyrpptogrpahic keysremain secure and effective in protecting sensistive data
Key longevity
A Type of encryption that enables data to be processed and manipulatedwithout the need for decryption.
Homoomorphic Encryption
Type of obfuscation where sensitive infomation is hidden in seemingly innoculous data.
Steganogrphy
This type of obfusication where sensitive data is turned into tokensthat hold no inheriant value. When a transaction occurs, the toke is used instede of orginal data, reducing the risk assocaited with ahndling sensitve info.
Tokenization
Type of obfusication where data is disgusied by replacing orginal data with ficticious data
Data Masking
The process refers to the technology adding random data to passwords ebfore they are hased and stored
Salting
Cryptographic technique desinged to transform a password into a longer more complex key. In an attempt to slow down the process of deriving the password
Key Stretching
Two methods used for key stretching
PBKDF2 and BCrypt
Where data batches called blocks that are distributed across countless computers. Accomplished through decentrialzation
Blockchain
The benefeits of the open publics ledger are as follows
Decentralization, security, trasnaction recording, consensus mechanisms, immutable and chronological, transparancy
Orgs taht validate digital identities using cryptogrpahic keys, ensuring the website we visit and the data we share are genuine.
CA - Certificate Authorities
Lists contain the serial numbers of certifcates that have been revoked, comprimised or expired which are maintained by CA’s
CRL’s