Cryptography Flashcards

1
Q

What is ECC?

A

Elliptic Curve Cryptography is a public-key cryptographic algorithm that uses elliptic curves to achieve security. ECC keys are smaller than RSA keys while still providing equivalent security. This makes ECC more efficient for devices with limited resources, such as mobile phones and embedded systems.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is an ephemeral key?

A

An ephemeral key is a temporary cryptographic key that is generated for each session. Ephemeral keys are used in conjunction with long-term keys to provide perfect forward secrecy (PFS).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Define PFS.

A

Perfect Forward Secrecy is a security property of cryptographic protocols that ensures that even if the long-term key used to establish a secure session is compromised, all past and future communications encrypted under that session key remain secure. PFS is achieved by using a different, ephemeral key for each session.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is CBC?

A

Cipher Block Chaining is a mode of operation for a block cipher that encrypts data in blocks. Each block of data is XORed with the previous ciphertext block before being encrypted by the block cipher. This chaining of blocks makes it more difficult for attackers to decrypt the data, even if they have knowledge of one of the blocks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is ECB?

A

Electronic Codebook is a mode of operation for a block cipher that encrypts each block of data independently. This means that the same plaintext block will always produce the same ciphertext block, regardless of the other blocks of data in the message. ECB is not as secure as CBC, but it is simpler to implement and can be faster in some cases.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Define GCM.

A

Galois/Counter Mode is a mode of operation for a block cipher that combines the benefits of CBC and CTR modes. It is as secure as CBC, but it is also more efficient. GCM is often used in protocols such as TLS and IPsec.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Define Symmetric Encryption and Asymmetric Encryption.

A

Symmetric encryption is an encryption method that uses the same key for both encryption and decryption. This means that the sender and receiver must agree on the key before they can communicate securely. Symmetric encryption is typically faster than asymmetric encryption, but it is also less secure. Asymmetric encryption is an encryption method that uses two different keys: a public key and a private key. The public key is used to encrypt data, and the private key is used to decrypt data. The public key can be shared with anyone, but the private key must be kept secret. Asymmetric encryption is more secure than symmetric encryption, but it is also slower.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is AES?

A

Advanced Encryption Standard is a block cipher that uses a 128-bit, 192-bit, or 256-bit key. It is considered to be the most secure symmetric encryption algorithm available.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Define RSA.

A

RSA is a public-key cryptosystem that uses two 2048-bit keys. It is considered to be one of the most secure asymmetric encryption algorithms available.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Define steganography.

A

steganography is the practice of hiding a secret message within another message or medium. The purpose of steganography is to conceal the existence of the message, making it more difficult for unauthorized parties to detect and intercept it.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is IPSEC?

A

Internet Protocol Security is a set of protocols that provide security for IP communications. IPsec can be used to protect data confidentiality, data integrity, and data origin authentication.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

List the two different modes of IPSEC.

A
  1. Transport mode protects the data portion of an IP packet, but not the IP header. This means that the source and destination addresses of the packet are still visible. Transport mode is typically used for host-to-host communications, such as between two computers.
  2. Tunnel mode encapsulates the entire IP packet in another IP packet. This means that the source and destination addresses of the inner packet are hidden from the outside world. Tunnel mode is typically used for gateway-to-gateway communications, such as between two routers.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is ESP?

A

Encapsulating Security Payload provides encryption and authentication for IP packets. ESP uses a symmetric-key encryption algorithm to encrypt the data portion of the packet. ESP can also be used to authenticate the packet using AH (Authentication header).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is Authentication Header (AH)?

A

authentication header is an IPsec protocol that provides authentication and integrity for IP packets. AH uses a cryptographic hash function to create a message authentication code (MAC) for each packet. The MAC is then used to verify the authenticity and integrity of the packet.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is CRC?

A

cyclic redundancy check is a checksum algorithm that is used to verify the integrity of data. CRCs are used in a variety of applications, including data storage, data transmission, and file verification.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Define SHA.

A

secure hash algorithm is a family of cryptographic hash functions that are used to create digital fingerprints of data. SHAs are used in a variety of applications, including data integrity verification, password hashing, and digital signatures.

17
Q

What is OCSP?

A

Online Certificate Status Protocol is a real-time protocol that allows a client to query a Certificate Authority (CA) to determine whether a particular certificate is revoked. OCSP is generally considered to be more efficient than CRLs, as it only requires a single request to the CA to check the status of a certificate.

18
Q

What is CRL?

A

Certificate Revocation List is a list of digital certificates that have been revoked by their CA. This list is typically published by the CA and made available to clients so that they can check the status of a certificate before using it.

19
Q

What is SAN?

A

subject alternative name is a digital certificate which allows multiple domains to be protected by a single certificate.

20
Q

What is a DIR certificate?

A

Distinguished Encoding Rules certificates is the most common format for digital certificates. They are used by a variety of applications, including web browsers, email clients, and VPNs. They are encoded in binary and have .der and .cer file extensions.

21
Q

What is a PEM digital certificate?

A

Privacy Enhanced Email Digital Certificate is a certificate typically used to secure email communications, but they can also be used for other purposes, such as securing web traffic or authenticating users. They are encoded in ASCII format and use .pem, .crt, .cer and .key file extensions.

22
Q

Define PFX.

A

Personal Information Exchange is a file format that is used to store digital certificates and their associated private keys. It is a popular format for storing certificates used for code signing, email encryption, and other applications that require a private key. Uses .pfx and .p12 file extensions.

23
Q

What is the P7B Digital Certificate Format?

A

P7B is a popular format for storing certificates used for website security, email encryption, and other applications that require a chain of trust. Generally used for Windows and Tomcat servers, encoded in ASCII, and use .p7b and .p7c file extensions.

24
Q

What is stapling?

A

stapling allows for checking digital certificate revocation status without contacting Certificate Authority (CA).

25
Q

What is pinning?

A

Pinning is a deprecated security mechanism designed to defend HTTPS websites against impersonation attacks performed with the use of fraudulent digital certificates.

26
Q

What is key escro?

A

Key escro is a trusted third-party storage solution providing backup source for cryptographic keys