Chapter 8 - Cryptography Flashcards Preview

CompTIA Security+ > Chapter 8 - Cryptography > Flashcards

Flashcards in Chapter 8 - Cryptography Deck (27):
1

How did Caesar cipher his text?

page 246
He shifted the letters 3 space to the right.

2

What is Substitution Ciphering?

page 246
Where each letter is substituted with another letter

3

What is Transposition Ciphering?

page 247
by changing the order of the group.

4

How does ROT13 ciphering work

page 278
By rotating the letter to the right 13 places

5

What is PKI?

page 278
Public-Key Infrastructure
Is intended to offer a means of providing security to messages and transaction on a grand scale.
Is a two-key, asymmetric with four main components: certificate authority (CA), registration authority (RA), RSA (the encryption algorithm) and digital certificates.

6

What is an organization that is responsible for issuing, revoking and distributing certificates.

page 279
Certificate Authority (CA)

7

What is the primary difference between and RA and an LRA?

page 281
LRA can be used to identify to establish the an individual. LRA involves the physical identification of the person requesting a certificate.

8

What is PKIX?

page 266
Public-Key Infrastructure X.509

9

What is PKCS?

page 266
Public-Key Cryptography Standards

10

What is X.509?

page 267
Defines the certificate formats and fields for public keys..
Also defines the procedure that should be used to distribute public keys.

11

What is X.509 v2 for?

page 267
CRL (Certificate Revocation List)

12

What is X.509 v3 for?

page 267
certificate

13

What are Symmetric Algorithms?

page 249
Require both ends of an encrypted message to have the same key and processing algorithm.

14

What is DES?

page 250
Data Encryption Standard
Has been used since the mid 70s.
It was the primary standard used in the government and industry until replaced by AES

15

What is AES?

page 250
Advanced Encryption Standard

16

RAS is named after who?

page 252
Ron Rivest
Adi Shamir
Leonard Adleman

17

What are some Asymmetric Algorithms?

page254
- Diffie-Hellman
- ElGamal
- Elliptic Curve (ECC)
- RSA

18

What three characteristics must Hashing Algorithms have?

page 255
- It must be one-way
- Variable length input produces fixed length output
- The algorithm must have few or no collisions

19

What types of Hashing algorithms should you be familiar with?

page 255
- Secure Hash Algorithm (SHA)
- Message Digest Algorithm (MD)
- RACE Integrity Primitive Evaluation Message Digest (RIPEMD)
- GOST
- LANMAN
- NTLM

20

What is Key Stretching?

page 256
Refers to the process used to take a key that might be a nit weak and make it stronger, usually by making it longer.

21

What methods are there for Key Stretching?

page 256
- PBKDF2 (Password-Based Key Derivative Function 2)
- Bcrypt

22

What some common code breaking methods?

page 257
- Frequency Analysis
- Chosen Plaintext
- Related Key Attack
- Brute Force Attacks
- Exploiting Human Error

23

What are the three most important concepts in Security?

page 259
- Confidentially
- Integrity
- Availibility

24

What is SET?

page 270
Secure Electronic Transaction
Provides encryption for credit card numbers that can be transmitted over the Internet. Visa and MasterCard developed it. SET is most suited fro transmitting small amounts of data.

25

WHat is SSH?

page 271
Secure Shell
A tunneling protocol originally used on Unix systems. SSH can be used in place of the older Remote Shell (RSH) utility that used to be a standard in the Unix world. It can be used in place of rlogin and Telnet.

26

What file name extensions should be allowed?

page 307
- ,doc, .docx
- .pdf
- .txt
- .xls, .xlsx

27

What file extension should not be allowed?

page 307
- .bat
- .com
- .exe
- .hlp
- .pif
- .scr