Cryptography Flashcards

1
Q

What is meant by asymmetric encryption?

A

Public key used to encrypt data, private used to decrypt, very CPU intensive

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is used to digitally sign a packet?

A

Senders private key

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is used to verify a digitally signed packet?

A

Senders public key

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is used to verify a senders public key?

A

Senders public key (digital) certificate

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is used to verify senders public key certificate?

A

Trusted C.A (Certificate Authority)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is a digital certificate?

A

Electronic document certifying public key of an entity (contains digital signature)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is a digital signature?

A

Code derived using private key of an entity

Verified using public key of signing entity to decrypt a hash and compare with CA

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

How would a recipient receive the public key?

A

Receiving senders digital certificate, via in band or out band key exchange

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

When sending encrypted data what key is used to encrypt?

A

Recipients public key, recipient decrypts with private key

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

When receiving encrypted data what key is used to decrypt

A

Recipients private key

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is IKE v1?

A

Establishes VPN IPSec phase 1 (initial control channel) and phase 2 tunnels
Isolated tunnels

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is IKE v2?

A

?

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is in band key exchange

A

Using in session mechanism

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is out of band key exchange

A

Distributing public key manually i.e copying it to computer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What algorithm does session key use?

A

Symmetric encryption algorithm

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What algorithm does public key use?

A

Asymmetric encryption algorithm

17
Q

What is DH Group?

A

Diffie Hellman group
Used to establish shared symmetric session keys
However Diffie Hellman exchange is asymmetrical

18
Q

What steps are carried out in IKE phase 1 tunnel?

A
Negotiates protocols:
H ash (algorithm)
A uthentication
G DH Group
L ifetime
E ncryption (algorithm)
19
Q

What steps are carries out in IKE phase 2 tunnel?

A

Optional: PFS (Perfect Forward Secrecy) runs Diffie Hellman again

20
Q

What is a block cipher?

A

Encryption performed on blocks of data

21
Q

What is a stream cipher?

A

Encryption performed bit by bit

22
Q

What is HMAC?

A

Hashed Message Authentication Code
Uses session key as part of hash formula
Prevents hacker changing data in transit regenerating hash as they don’t have session key

23
Q

What is key escrow?

A

Trusted entity with copy of keys needed for decryption which can be delegated to authorised third parties

24
Q

What is symmetric encryption?

A

Both keys can encrypt and decrypt, used for most use cases as lower CPU overhead

25
What is ECC?
Elliptical Curve Cryptography | uses shorter key for lower overhead and good encryption
26
What is ephemeral key?
Key used for short period of time, i.e offset of key is used for each packet
27
What is NTLM and NTLMv2?
Old prior to kerberos authentication
28
What is PGP/GPG?
Pretty Good Privacy | GNU Privacy Guard compliant version of PGP by IETF committee
29
What is DHE and ECDHE?
Diffie Hellman Ephemeral | Eliptical Curve Diffie Hellman Ephemeral
30
What is PBKDF2
Password Based Key Deviation Function 2 | Applies pseudo random functions: hashing, salting, HMAC, encryption to create derived key
31
What is PRNG?
Pseudo Random Number Generator