Management of Cryptography Flashcards

1
Q

Key Management

A

The protection factors are the strength of the encryption algorithm and key management, the activities related to the management of encryption keys.
The level of effort taken to protect an encryption key should correspond to the value
of the information that is encrypted with the key.

The life cycle of encryption keys includes these activities:
- Key creation
- Key protection and custody
- Key rotation
- Key destruction
- Key escrow

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Key Creation

A

The creation of random encryption keys should be performed on a secure
server, so that an intruder is not able to observe or re-create the key generation process or
intercept generated encryption keys.

A key must be truly random and non-predictable

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Key Protection and Custody

A

Access to private keys and symmetric encryption keys must be tightly controlled. Confidentiality of encrypted information is only as good as the protection of encryption keys.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Key rotation

A

Regulation or prudence necessitates the occasional rotation of encryption keys.

An organization that encrypts sensitive information should have formal procedures to be followed in the event that an encryption key is compromised.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Key destruction

A

When an encryption key is no longer needed, it should be destroyed securely. This means that the key must be destroyed in all locations where it was stored.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Key Escrow

A

A business arrangement can be established where a trusted third party will hold encryption keys in escrow. The typical purpose for key escrow is the greater certainty
that data can be recovered.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Message Digest and Hashing

A

A message digest, or hash, is the result of a cryptographic operation on a message or file.
A cryptographic hashing algorithm will read the entire contents of a message or file and produce a fixed-length digest. A message digest is used to confirm that a message or file has not been altered.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

The Principles of a message digest

A

The principles of message digests are:
- It should not be possible to recreate the original message from the digest.
- It should be impossible (well, computationally infeasible) to create messages that will result in a given message digest.
- No two messages should result in the same message digest (although collisions are possible).
- A message digest should be the result of the entire message, not a portion of it.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Message Digest Algorithms

A
  • MD5
  • SHA-1
  • SHA-2
  • SHA-3
  • Whirlpool
  • HMAC
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Digital Signature

A

A digital signature is a method used to verify the authenticity and integrity of a message or
document.

Some of the algorithms used for digital signatures are:
- Digital Signature Algorithm (DSA)
- El Gamal
- Elliptic Curve DSA (ECDSA)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Digital Certificates

A

A digital certificate is an electronic document that contains an individual’s public encryption
key together with identifying information such as the person’s name and contact information.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Non-Repudiation

A

The use of digital signatures and other factors such as strong authentication give rise to situations where it can become difficult for an individual to reasonably deny that they performed a transaction.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

PKI

A

A public key infrastructure (PKI) is an online facility where parties’ public keys can be easily retrieved.

A PKI can store other information in addition to public encryption keys, and serve multiple purposes in an identity management service

How well did you know this?
1
Not at all
2
3
4
5
Perfectly