Cryptographic Concepts Flashcards

(32 cards)

1
Q

Digital Signatures

A

Encrypted Hash of Senders Private Key
supplies, Authentication, Non-repudiation and Integrity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Digital Signatures

A

Encrypted Hash of Senders Private Key
supplies, Authentication, Non-repudiation and Integrity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q
A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Digital Signatures

A

Encrypted hash of sender private key

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

DSS

A

Digital Signature Standard
SHA 2or 3 message softest in conjunction with 3 encryption algorithms; DSA, RSA, ECDSA

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Salting

A

Random data used for extra input to a hash. Reduced effectiveness for Rainbow Tables

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

ECC

A

Elliptic Curve Cryptography

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Symmetric

A

Shared secret key,
Poor scalability, easy distribution and non repudiation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Asymmetric

A

Public-Private keys
Scalability, easy distribution

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Asymmetric Key Use with data

A

Data:
To encrypt use recipients public key
Decrypt use your own private key
Signature:
Use your private key
Recipient uses public key

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Symmetric algorithm Use

A

For bulk encryption eg AES256

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Asymmetric Algorithm Use

A

Distribution of symmetric keys
Digital signatures, Non repudiation and key agreement
Eg. RSA, DSS, ECC

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Hash Use

A

Digital signatures
Pseudo-Random number generation
Integrity services

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Post Quantum Cryptography

A

New kinds of approaches using todays computers but will be resistant to quantum computers when they arrive

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Quantum Key Distribution

A

Transferring with photons of light and can’t be copied or intercepted

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

ECB

A

Electronic Codebook Mode
Block Cipher
Least secure- 64bit blocks with chosen key block repetitions will use same encrypted block

17
Q

CBC

A

Cipher Block Chaining
Each block is XORed with the block of cipher immediately preceding

18
Q

CTR

A

Uses an incrementing counter and errors do not propagate

19
Q

Blockchain

A

Distributed public ledger
Does not use intermediaries
Data chained with a block holding the hash for itself and that of the preceding
To create new, computer solves a puzzle and sends solution to the others participating in the chain

20
Q

Lightweight Cryptography

A

ECC (asymmetric) for low power devices
AES256 (symmetric) for military

21
Q

PFS

A

Perfect Forward Secrecy
Don’t use server’s private RSA key
ECDHE to exchange keys and move on
Cannot use the private key to decrypt
More computer power

22
Q

ECDHE

A

Elliptic Curve Diffie-Hellman Ephemeral
Used for perfect forward secrecy

23
Q

RSA

A

Rivest, Shamir & Adleman
One of oldest public (asymmetric) key cryptographic algorithms widely used for email and web

24
Q

XOR

A

Exclusive Or
2 bits identical = 0
2 bits different = 1

25
SRTP
Secure Real Time Transfer Protocol For voice and video Uses AES, HMAC-SHA1
26
NTPsec
Secure Network Time Protocol
27
S/MIME
Secure Multipurpose Internet Mail Connections Public key encryption and signing of content PKI organisation required
28
SSL/TLS
Secure Sockets Layer/ Transports Layer Security Uses HTTPS, with private key on server to transfer symmetric session key.
29
IPsec
Layer 3 authentication and encryption AH (Authentication Header) ESP (encapsulation security payload)
30
FTPS/SFTP
FTPS uses SSL SFTP uses SSH (better) and gives file , directory functionality, interrupt her
31
SASL
Simple Authentication and Security Layer Provides authentication with LDAP, Kerberos, Certificates
32
How to secure DHCP?
In AD DHCP servers must be authorised Switches can be configured with trusted interfaces Distribution only allowed from trusted interfaces Cisco call it DHCP Snooping