Chapter 3 Study guide Flashcards

1
Q

What does Hashing ensure?

A

Integrity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What does encryption ensure?

A

Confidentialty

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Collision attack

A

When two distinct and different messages happen to have the same hash value.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Birthday attack

A

Exploits the birthday paradox in probability.

The attacker tries to find two different input messages that produce the same hash value, called a collision

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

How does NT LAN Manager (NTLM) work?

A
  • Each of the characters in the input password are converted into Unicode
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

LDAP uses what?

A
  • Uses X.500
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Explain the Digital Signature (Integrity) process when sending a message.

A
  • Bob is sending Alice a message.
  • Bob will run and attach a hash onto the message (Integrity).
  • Bob uses his private key to Digitally Signing it (hash included).
  • Bob will encrypt and send the message, which will be decrypted by Alice (Confidentiality).
  • Alice can verify the hash (Integrity Check) after using Bobs public key to decrypt the Digital Signature.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Explain the encryption process (Confidentiality) when sending a message.

A
  • Bob is sending Alice a message.
  • Bob Digitally signs the message.
  • Bob encrypts his message using Alice’s Public key
  • Alice decrypts Bob’s message using her private key.
  • Alice can now decrypt the digitally signature.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

One Time Password (OTP) and TOTP

A
  • OTP - Password used once.
  • TOTP - Password used once, but has a timer on it.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Give a simplified version of the Digital Signature and Encryption process.

A
  1. Digitally sign (Integrity/Hash)
  2. Encrypt (Confidentiality)
  3. Send
  4. Decrypt (Condidentiality)
  5. Decrypt Digital Signature (Integrity)
How well did you know this?
1
Not at all
2
3
4
5
Perfectly