Crypto Study 1 Flashcards
Ch 6 of (ISC)2 CISSP Official Study Guide (40 cards)
What are the advantages of ASYMMETRIC KEY encryption?
- Addition of new users requies generation of only one public-private key pair
- Key revocation of one key is easy to accomplish
- Provides Repudiation, Authentication and nonrepudiation
- Key distribution simple- public key can be made available to anyone and public key cannot derive the private key
- No pre-existing communications need to exist (such as sharing a secret key as in symmetric key cryptography).
Name the modes of DES Symmetric encrption algorithm
- Cipher Block Mode (CBC)
- Cipher Feedback Mode (CFM)
- Output Feedback Mode (OFM)
- Counter Mode (CTR)
What is a HASH FUNCTION and what is it used for?
- Hash functions take a message and create a unique output value called a message digest. Message digest by the recipient must match.
- Hash functions are used for digital signatures for repudiation
- How long is a HASH functions message digest (normally)?
- What are the FIVE basic requirements for a cryptographic hash?
- Most are 128 bits or larger, but can also be derived froma single bit
2. Five basic requirments of a crypto hash:
- The input can be of any length
- The output has a FIXED length
- The hash function is ONE WAY
- Hash function is relatively easy to compute for any input
- The hash function is collison free
1. What is MD4 and how does it work?
2. Is it still secure?
- MD4 is a message digest algorithm that makes the message 64 bits smaller than 512 bits. It processes 512 bit blocks with a final output of a 128 bit message digest.
- It is no longer considered secure- it had a collision problem.
What are the HASH value lengths for HAVAL (MD5 variant) and what does it stand for?
- Hash of Variable Length
- 128, 160, 192, 224 and 256 buts
- What is HMAC, what does it stand for and what is its hash value length?
- Hash Message Authenticating Code (HMAC).
- Its key length is variable
What are the key lengths of:
MD2
MD4
MD%
Each has a key length of 128 bits.
What is the key length for SHA-1?
160 bits
What does HASHING to messages provide and how can Privacy be
implemented with hashing?
- Provides Authentication, integrity and non-repudiation.
For privacy the entire message can be encrypted with the public key.
What is HMAC and what is it used for?
- Stands for Hashed Message Authentication Code.
- It guarantess integrity but does not provide non-repudiation and cna be combined with SHA-3 using a shared secret key (therefore does not provide non-repudiation).
What are the algorithms that are part of the DSS (Digital Signature Standard)?
- DSA (Digital Signature algorithm) in FIPS 186-4
- RSA (Rivest-Shamir- Adelman) ANSI x9.31
- ECDSA (Elliptic Curve DSA- ANSI x9.62
‘What are Schorr and Nyberg-Rueppel?
Dignature signature algorithms.
What are these terms associated with certificate authorities (CAs)?
CPV= Certificate path validation
Enrollment= you supply your public key and CA issues a digitally signed certificate
Verification= Using the CAs piblic key to verify a certificate is authenticate
CRL= Certificate revocation list or OCSP= Online Certificate Status Protocol
1. What are the specific disk encryption technologies for Windows?
2. What about Mac OS?
3. What does OS Vera Crypt support?
- BitLocker amd EFS (Encrypting File System)
- FileVault encryption
- Linux, Windows, and Mac
What should you do if your require confidentiality
with an e-mail?
You should encrypt the message.
If you need to ensure integrity of an
e-mail message what should you do?
You should digitally sign the message
What should you apply to an e-mail if you need authentication, integrity and/or non-repudiation?
You should digitally sign the message.
What should you apply to an e-mail if your message requires authentication, integrity, non-repudiation and confidentiality?
You should encrypt and digitally sign your message.
What is PGP and what are some of the commercial versions used for?
PGP is Pretty Goof Privacy and is an e-mail encryption algorithm. The commercial version provides the following:
- RSA for KeyExchange
- IDEA for encryptio/decryptio
- MD5 for message digest
What types of encryption does the Freeware version of PGP use for encryption and for key management?
- Cast for encryption/decryption
- Diffie-Hellman for key exchange
What does S/MIME stand for and what encryption
algorithm does S/MIME use?
- Secure Muliti-Purpose Mail Extension
- RSA
What is Link Encryption?
It is encryption that encrypts traffic entering the tunnel on one end and decrypts it on the other end. This ensures communications are secure between to distinct points.
What is end to end encryption?
Protect communicatiosn between two parties (e.g. user and server). This portects from monitoring on an encrypted side or traffic sent over an unencrypted link.