COMPSCI 455 Flashcards
(17 cards)
True or False, The public key in any public key cryptosystem is always used for encryption, and private key for decryption
False
In what scenario is private key cryptography preferred over public key?
Bulk data encryption
In what scenario is public key cryptography preferred over private key?
Authentication
What scenario is public and private key cryptography used in tandem?
Public key to exchange a session key and a private session key for bulk data en/decryption
A user of direct digital signature could claim that their private key was stolen and used to sign fraudulent messages. How do we prevent this ploy?
Include a timestamp with each digital signature and enforce a policy of frequent key changes
Why are X.509 certificates preferred over a PKA?
Users can authenticate one another using certificates without lengthy transactions with a third party
Who can verify the integrity of an X.509 certificate?
Anyone
Who can create an X.509 certificate?
Anyone
Who can sign a X.509 certificate?
Only the certificate authority
How does Kerberos verify the identity of the workstation user?
The authentication server encrypts the ticket using a key derived from the user’s workstation password so only the corresponding user would be able to decrypt it
Name 5 things that the client receives from the authentication server?
- A timestamp
- The identity of the client
- A key for the client to use when communicating with the ticket-granting server
- The identity of the ticket-granting server
- A service-granting ticket
What is the difference between connecting and binding to an endpoint?
Client sockets connect to an endpoint, server sockets bind to an endpoint
Who provides the attributes of principles in FIM?
Principles and Administrators
A PIV smart card has three types of memory, they are ___, ___, and ___
ROM
EEPROM
RAM
What is the purpose of building SSL into modern web browsers and other everyday web applications?
Provide built-in security
SSL is deployed above the ___ layer and below the ___ layer on the network stack
Transport
Application
What are the SSH authentication methods?
Public key
Password
Host based