don't use Flashcards
(137 cards)
Digital signature require what?
Public Key infrastructures (PKI)
X.509 V.4 is for what?
Certificate Standard
HMAC
Hashed Message Authentication Code (no PKI Used)
Certificates are Digitally signed by who?
(CA) Certificate Authority
The steps in a SSL / TLS connection?
- The client makes a SSL Session
- The Server provides its Certificate with its public key
- the client encrypts with the servers public key
- the server decrypts wit it’s private key.
Main Hashing Algorithms and bit size
- MD-5 128 bits
- SHA-1 160 Bits
- SHA-256 256 Bits
OCSP ?
Online Certificate Status Protocol
( Certificate Revocation)
How to tell if a Certificate has been Revoke
- Online Certificate Status Protocol (OCSP)
2. CRL (downloadable list from CA)
Two Documents produce the same Hashed # ?
A collisions
An Attempt to Cause Collisions
Birthday Attacks (Hashing)
Certificates help to prevent what ?
Man in the middle attacks
Symmetric Stream Crypto
RC-4 Used on WEP
4 parts of the Public Key infrastructures (PKI)
- (CA) Certificate Authority
- (RA) Registration Authority
- Certificate Repository
- Certificate Revocation list
A Very Efficient Crypto?
ECC Elliptical Curve Cryptography
what Cryptography is used on Low CPU powered devices?
ECC Elliptical Curve Cryptography
Secure Key-Agreement Without Pre-shared Secrets
Diffie Hellman
First Asymmetric Algorithm
Diffie Hellman
Use Factorization
RSA use a Trap-Door function for it
Digital signature use what Algorithm
RSA
What are the 6 Asymmetric Algorithm
- RSA
- DSA
- ECC = Elliptical Curve Cryptography
- El Gamall
- DH = Diffie Hellman
- Knapsack
Bulk Encryption use What Cryptography Type?
Symmetric
Cryptography used for Key Encryption and distribution
Asymmetric
Asymmetric Algorithm Key Formula
2N
Symmetric Algorithm Key Formula
N=(N-1) /2