lecture 6 Flashcards

(55 cards)

1
Q
A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What are digital certificates?

A

Digital certificates are a technology used to associate a user’s identity to a public key digitally signed by a trusted third party

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What does a digital signature prove?

A

A digital signature proves a document originated from a valid sender

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is a weakness of using digital signatures?

A

It only proves the sender’s private key was used to encrypt the signature but an imposter could post a public key under a sender’s name

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What role does a trusted third party play in digital certificates?

A

It verifies the owner and that the public key belongs to that owner

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is a Certificate Signing Request (CSR)?

A

A request with user information like name address and email to get a digital certificate

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Who processes and verifies the authenticity of a CSR?

A

An intermediate Certificate Authority (CA)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is the purpose of an offline Certificate Authority (offline CA)?

A

To ensure security by keeping the root CA offline except for specific infrequent tasks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is a Certificate Repository (CR)?

A

A publicly accessible centralized directory of digital certificates

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Name a reason a digital certificate would be revoked.

A

Certificate no longer used or private key lost or exposed

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is a Certificate Revocation List (CRL)?

A

A list of digital certificates that have been revoked

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What does OCSP stand for and what does it do?

A

Online Certificate Status Protocol it performs real-time lookup of a certificate’s status

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is OCSP stapling?

A

A variation where web servers regularly query OCSP Responder to get a signed time-stamped response

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Name the most common categories of digital certificates.

A

Root certificates domain certificates hardware and software certificates

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is certificate chaining?

A

Linking several certificates together to establish trust between all certificates involved

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is a root digital certificate?

A

A self-signed certificate created and verified by a Certificate Authority as the start of a certificate chain

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

What are domain digital certificates used for?

A

To ensure authenticity of the web server to the client and the cryptographic connection

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Name three types of domain digital certificates.

A

Domain validation Extended Validation (EV) Wildcard

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

What is the standard format for digital certificates?

A

X.509

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

What are the three encoding formats for X.509 certificates?

A

Basic Encoding Rules BER Canonical Encoding Rules CER Distinguished Encoding Rules DER

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

What does PKI stand for?

A

Public Key Infrastructure

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

What is the purpose of PKI?

A

To manage digital certificates asymmetric cryptography key management

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

Name three actions facilitated by PKI in certificate management.

A

Create store distribute revoke

24
Q

What is direct trust in PKI trust models?

A

One person knows and trusts the other person directly

25
What is third-party trust in PKI trust models?
Two individuals trust each other because they both trust a third party
26
Name the three PKI trust models using a Certificate Authority.
Hierarchical trust model distributed trust model bridge trust model
27
What is the hierarchical trust model?
A single hierarchy with one master CA called root signing all certificates
28
What is a limitation of the hierarchical trust model?
If the single CA private key is compromised all certificates become worthless
29
What is the distributed trust model?
Multiple CAs sign digital certificates eliminating hierarchical model limitations
30
What is the bridge trust model?
One CA acts as a facilitator connecting other CAs but does not issue certificates
31
What is a Certificate Policy (CP)?
A published set of rules governing the operation of a PKI
32
What is a Certificate Practice Statement (CPS)?
A technical document describing how a CA uses and manages certificates in detail
33
Name the four stages of the Certificate Life Cycle.
Creation suspension revocation expiration
34
Where can public keys be stored?
Embedded within digital certificates
35
Where can private keys be stored?
On the user's local system or hardware like smart-cards and tokens
36
What are two key usage pairs in key management?
One pair to encrypt information the other for digital signatures
37
Name some key handling procedures.
Escrow expiration renewal revocation recovery suspension destruction
38
Name some common cryptographic transport protocols.
SSL TLS SSH HTTPS S/MIME SRTP IPsec
39
What is SSL?
Secure Sockets Layer a protocol to create encrypted data paths between client and server
40
What is TLS?
Transport Layer Security a replacement for SSL with improved security
41
What is SSH used for?
Encrypted alternative to Telnet for accessing remote computers securely
42
What port does HTTPS use?
Port 443
43
What is S/MIME?
A protocol for securing email messages allowing encryption and digital signatures
44
What does SRTP protect?
Voice over IP communications adding authentication and confidentiality
45
What does IPsec provide?
Authentication confidentiality and key management for IP communications
46
Name the two encryption modes IPsec supports.
Transport mode encrypts data only Tunnel mode encrypts header and data
47
Why are cryptographic protocols difficult to design securely?
Because they are complex and security proofs are complicated compared to algorithms
48
What happens if cryptography is improperly applied?
It can lead to vulnerabilities that attackers exploit
49
What determines the strength of a cryptographic key?
Randomness length and cryptoperiod
50
Does keeping algorithms secret enhance security like keys?
No algorithms need to be public for cryptography to be useful
51
What is a block cipher mode of operation?
Rules specifying how block ciphers handle blocks of plaintext
52
Name common block cipher modes.
Electronic Code Book ECB Cipher Block Chaining CBC Counter CTR Galois Counter GCM
53
What is a crypto service provider?
Software or hardware that implements cryptographic algorithms generates keys and authenticates users
54
What is certificate chaining used for?
Verifying that a digital certificate is genuine by linking certificates to establish trust
55
What do domain validation certificates verify?
Control over the domain name but not the trustworthiness of individuals behind the site