Cryptography Flashcards

1
Q

What is X.509?

A

A Standard that Defines the Format of PKI (Public Key Infrastructure) digital certificates.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What technology is NOT PKI x.509 compliant and cannot be used in various secure functions?
1. AES
2. PKCS
3. Blowfish
4. SSL/TLS

A
  1. Blowfish
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What does PKCS stand for?

A

Public Key Cryptography Standard

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is Asymmetric Encryption?

A

Uses Public and Private Key pairs.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is Symmetric Encryption?

A

Single/Shared Key.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is Elliptic curve cryptography (ECC) encryption best used for?

A

Mobile devices.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

How many bits does MD5 (Message Digest algorithm) produce?

A

128 bits.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

How many bits does SHA-1 produce?

A

160 bits

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

How many bits does SHA-2 produce?

A

Has 4 functions, outputs are 224, 256, 384 and 512 bits.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

How many bits does NTLM produce?

A

NTLM creates a 128-bit fixed output.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What algorithms does Public Key Infrastructure (PKI) use?

A

RSA 1024 bit

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is IKE (Internet Key Exchange)?

A

Protocol used to setup security associations with IPSEC VPNs.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Which encryption type MOST likely is used for securing the key exchange during a client-to-server VPN connection?

A

ISAKMP
It is used in IPSec, which is commonly used in securing the key exchange during the establishment of a client-to-server VPN connection.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

How many bits does RIPEMD hash produce?

A

160 bits

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

How many bits are in the Diffie-Hellman (DH) group 1?

A

768 bits

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

How many bits are in the Diffie-Hellman (DH) group 2?

A

1024 bits

17
Q

How many bits are in the Diffie-Hellman (DH) group 5?

A

1536 bits

18
Q

How many bits are in the Diffie-Hellman (DH) group 14?

A

2048 bits

19
Q

How many bits are in the Diffie-Hellman (DH) group 15?

A

3072 bits

20
Q

What is a FREAK attack in SSL?

A

Type of Downgrade attack to force RSA to use weaker length.

21
Q

What is a POODLE attack in SSL?

A

Downgrade from TLSv1.0 to SSLv3.0 to decrypted communication.

22
Q

What is a DROWN attack in SSL?

A

Decryption vulnerability in SSLv2.0

23
Q

What is a Replay Attack?

A

Used for MITM attack, communication is maliciously or fraudulently repeated or delayed by the attacker.

24
Q

What is key escrow?

A

Cryptographic key exchange process in which a key is held in escrow, or stored, by a third party

25
Q

In this cryptography attack method, the cybercriminal makes a series of interactive queries, choosing subsequent plaintexts based on the information from the previous encryptions?

A

Adaptive chosen-plaintext attack