Chapter 3 Study guide Flashcards
1
Q
What does Hashing ensure?
A
Integrity
2
Q
What does encryption ensure?
A
Confidentialty
3
Q
Collision attack
A
When two distinct and different messages happen to have the same hash value.
4
Q
Birthday attack
A
Exploits the birthday paradox in probability.
The attacker tries to find two different input messages that produce the same hash value, called a collision
5
Q
How does NT LAN Manager (NTLM) work?
A
- Each of the characters in the input password are converted into Unicode
6
Q
LDAP uses what?
A
- Uses X.500
7
Q
Explain the Digital Signature (Integrity) process when sending a message.
A
- Bob is sending Alice a message.
- Bob will run and attach a hash onto the message (Integrity).
- Bob uses his private key to Digitally Signing it (hash included).
- Bob will encrypt and send the message, which will be decrypted by Alice (Confidentiality).
- Alice can verify the hash (Integrity Check) after using Bobs public key to decrypt the Digital Signature.
8
Q
Explain the encryption process (Confidentiality) when sending a message.
A
- Bob is sending Alice a message.
- Bob Digitally signs the message.
- Bob encrypts his message using Alice’s Public key
- Alice decrypts Bob’s message using her private key.
- Alice can now decrypt the digitally signature.
9
Q
One Time Password (OTP) and TOTP
A
- OTP - Password used once.
- TOTP - Password used once, but has a timer on it.
10
Q
Give a simplified version of the Digital Signature and Encryption process.
A
- Digitally sign (Integrity/Hash)
- Encrypt (Confidentiality)
- Send
- Decrypt (Condidentiality)
- Decrypt Digital Signature (Integrity)