CRYPTOGRAPHIC SOULTIONS Flashcards

(57 cards)

1
Q

symmetric key

A

You have the same key as the main owner. Shares similiar details.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Asymmetric Key

A

Two different keys one for decryption and one to encrpyt.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

DES-DATA ENCRYPTION STANDATD

A

Uses 64bit blocks. Key strength is only 56-bits.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

TRIPLE DES 3DES

A

Three diffrent 56 bit keys.I

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

IDEA International data encryption algorithm

A

SYMMETRIC BLOCK AND USES 64 BIT BLOCKS.KEY SIZE IS 128 not used as much

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

AES-ADAVANCED ENCRYPTION STANDARD

A

SYMMETRIC BLOCK USES 128,192 OR 256 BIT BLOCKS.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Blowfish

A

Symmetic block cipher that uses 64bit 4048 bits also.Not widelly used

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

TWOFISH

A

Provices 128 bit 192 or 256 encryption keys open source

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

RC CIPHER SUITE

A

RIVEST CIPHER
r

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

RC4

A

40 BITS AND 2048 USED FOR SSL AND WEP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

RC5

A

UO TO 2048 BITS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

RC6

A

STRONGER THEN RC5

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

assymetric algorithms

A

Public and private key
USIA CIA TRAID AND NON-REPUDIATION

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

DIGITAL SIGNATIURE

A

USES YOUR PRIVATE KEY FOR INTEGRITY

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

DIFFIE-HELLMAN

A

Used to conduct key exchanges and secure key like VPN’s over a unsecure network
ASSYMETRIC

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

RSA

A

Assymmetric used for signatures key exchange and uses prime numbers 1024-4068

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

ELLIPTIC CURVE CRYPTOGRAPHY

A

USED IN MOBILE DEVICES AND BASED ON ALGEBRAIC STRUCTURES. 256 bit key

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

HASHING

A

One way cypto function and take an inpit and produces a unique message in the output

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

MD5

A

Creats 128 bit and most popular.limited in unique values.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

SHA-SECURE HASH ALROGITHM

A

SHA-1:160 bit has digest
SHA 2: longer digest 224,256,384,512
SHA 3: 224 and 512 bits but major increase in security.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

RIPEMD RACE INTEGRITY PRIMITIVE ECALUATION MESSAGE DIGEST

A

160,256,320 BIT. 160 BIT IS COMMANLY USED

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

RIPEMD-160

A

OPEN SOURCE

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

HMAC HASH BASED MESSAHE AUTH CODE

A

USED TO CHECK THE INTERGRITY OF A MESSAGE.
HMAC-MD5, SHA1 SHA256 ETC

24
Q

GOV USES DIGITAL SCURITY STANDARD

A

160 BIT BUT OTHER COMPANIES USE RSA CAUSE ITS FASTER.

25
KEY STRECTHING- TO INCREASE KEY
Weaker key becomes stronger to get a more secure key.
26
SALTING
RANDOM DATA INTO A ONE CRYPTOGRAHIC HASH TO HELP PROTECH AGIANST PASSWORDS
27
DICTIONARY ATTACK
ATTACKER TRIES EVERY WORD FROM A PREDEFINED LIST.
28
BRUTE FORCE ATTACK
TREIS EVER POSSIBLE PASSWORD COMBO
29
RAINBOW TANLES
TABLES FOR REVERSTING CRYPTOGRAPHIC HASH FUNCTIONS
30
NONCE
NUMBER USED ONCE. UNIQUE NUMBER FOR AITHENTICATION PROCESS.
31
INCORRECT PASSWORDS LOCK ACCOUNT
IDEALLY 3 TIMES TO LOCK PASSWORD TO STOP ATTACKS.
32
PUBLIC KEY INFRASTRCURE
BASED ON ASYMMETRIC ENCRYPTION ALSO HTTPS
33
CERTIFICATE AUTHORITY
Digital certs and keeps the level of trust between all of the cert authorities around the world.
34
KEY ESCROW
Process where crypto keys are stored in a secure third-party location.
35
DIGITAL CERTS
Combines a public key with user identity x.509 protocol
36
wildcard cert
allows all of the subdomains to use same public key certs. Save money and can be easier to manage.
37
SINGLE SIDED CERT
ONLY REQUIRES THE SERVER TO BE VALIDATED.
38
DUAL SIDE CERT
USES SERVER AND USERS TO BE VALIDATED
39
SELF SIGN CERT
DIGITAL CERT ARE SIGNED BY THE SAME ENITIY.
40
THIRD PARTY CERT
DIGITA CERT ISSUED BY A CERT AUTHORITY
41
ROOT OF TRUST
EACH CERT IS VALIDATED USING CONCEPT OF ROOT OF TRUST. MOVES FROM BOTTOM ALLT EH WAY TO THE TOP. TRUSTED VERIFIED PROVIDER
42
CERT AUTHORITY
TRUSTED 3RD PART IS ISSUES DIGITAL CERTS.
43
REGISTRATION AUTHORITY
REQUEST IDENTIFYING INFO FROM THE USER AND FORWARDS THAT CERT REQUEST UP TO THE CA AND CREAT THE DIGITAL CERT
44
CERT SIGNING REQUEST
OBTATING YOUR DIGITAL CERT. NAME DOMIAN NAME LOCALITY AND COUNTRY
45
CERT REVOCATION LIST
ONLINE LIST OF DIGITAL CERTS THE CA HAS ALREADY REVOKED DUE TO A DATA BREACH
46
OCSP
ONLINE CERT SERVICE PROTCOL DETERMINES REVOCATION STATUS USING SERIAL NUMBER
47
OCSP STAPLING
ALLOWS THE CERT HOLDER TO GET THE OCSP RECORD FROM SERVER AT REGULAR INTERVALS. SSL OR TLS HANDSHAKE
48
PUBLIC KEY PINNING
ALLOWS HTTPS WEBSITE TO RESIST IMPERSONATION ATTACKS.
49
KEY ESCROW AGENTS
OCCUES WHEN SECURE COPY OF A USERS PRIVATE KEY IS BEING HELD IF THEY ACCIDENTALLY LOST IT.
50
KEY RECOVERY AGENT
RESTORE CORRUPTED OR LOST KEY
51
TPM TRUST PLATFORM MODUE
A MICRO CONTROLLER DESIGNED TO SECURE HARDWARE THRY INTERGRATED CRYPTO KEYS. ALSO KNOWN USING BIT LOCKER
52
HSM HARDWARE SECURITY MODULE
HIGH SECURITY BANK VALULT. FINANCCE TRANSTIONS
53
KEY MANAGEMENT SYSTEM
MANAGES AND STORES AND DISTRUBTES KEYS AND DELETES IF NEEDED
54
SECURE ENCLAVE
INTEGRATED INTO MAIN PROCESSOR OF SOME DEVICES.CFINGER PRINTS FACIAL AND APPLE PAY
55
DOWNGRADE ATTACKS
AIMES TO FORCE A SYSTEM INTO A WEAKER/OLDER PROTOCOL. THIS CAN EXPLOIT WEAKNESS
56
COLLISION ATTACK
FIND TWO DIFFERENT INPUTS THAT HAVE THE SAME HASH OUTPUT.
57
Diffie-Hellman
an is an asymmetric cryptographic technique specifically designed for securely exchanging cryptographic keys over public channels, allowing two parties to generate a shared secret without having previously met.