Module 03 - Criptography Flashcards

(103 cards)

1
Q

Definition:
Cryptography

A

The process of writing or solving messages using a secret code

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Definition:
Security through obscurity

A

Protecting by hiding something

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Definition:
Encryption

A

A form of cryptography, it’s a process of converting text into unintelligible text, or a ciphertext.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Definition:
Ciphertext

A

Encrypted text

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What’s Cryptanalysis?

A

The art of cracking cryptographic systems

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q
A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What are Encryption Keys?

A

String used to encrypt and decrypt messages, generated by ciphers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What kinds of encryption keys are there?

A

Symmetric and Assymetric

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Definition:
Symmetrick algorithm

A

The same key that encrypts also decrypts

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Definition:
Asymmetric algorithm

A

Uses a public key to encrypt and a private key to decrypt

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Definition:
Hashing

A

The process of converting one value into another, no decrypting, no duplicates

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Definition:
Salt [Hashing]

A

It’s the process of fixating a string at the end of a value before hashing it, to generate a completely different hash

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What’s a Digital Signature?

A

Verifies that data is legitimate, non-repudiation.

Private key + Hash of data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What’s non-repudiation?

A

The concept of not being able to disassociate the ‘cause’ from the ‘consequence’.
Audit trails

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Acronym:
ECC

A

Elliptic Curve Cryptography

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Definition:
Elliptic Curve Cryptography - ECC

A

Cryptography method that generates more complex and smaller encryption keys

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Definition:
Perfect Forward Secrecy

A

Most used in messaging apps, uses a different encryption key for each message in the same conversation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Definition:
Steganography

A

Technique of hiding files, messages, bytes in other files, messages or bytes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Definition:
Cipher or Encryption Algorithm

A

Cryptographic process that encodes and decrypts data, using encryption keys

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

What are the types of ciphers?

A
  1. Substitution and Transposition algorithm
  2. Symmetric Algorithm
  3. Asymmetric Algorithm
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Acronym:
AES

A

Advanced Encryption Standard

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

True or false:
The larger the key’s length the more memory and processing power to encrypt/decrypt

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

Definition:
Brute force cryptoanalysis

A

Attempt to decrypt a ciphertext with every possible key

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

True or false:
Symmetric algorithm is more processing consuming that Asymmetric

A

False

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
List common asymmetric algorithms
1. RSA 2. ECC 3. DSA 4. Diffie-Hellman
26
Acronym: RSA
Rivest-Shamir-Adleman
27
Acronym: DSA
Digital Signature Algorithm
28
What RSA is used in?
Mostly in creating digital signatures
29
What DSA is used in?
Only in creating digital signatures
30
What Diffie-Hellman is used in?
Security protocols such as TLS, SSH, IPSec and others
31
What ECC is used in?
Securing data transmission, mainly in websites
32
What are Hybrid Cryptosystems?
Combine the efficiency of symmetric encryption with the convenience of asymmetric encryption.
33
Describe the process in Hybrid Cryptosystems
Generate a symmetric key. Encrypt the data with the symmetric key. Encrypt the symmetric key with the recipient's public key. Send the encrypted data and the encrypted key.
34
Definition: Ephemeral Keys
Encryption keys generated for each new session or message sent, used in PFC
35
Acronym: PFS
Perfect Forward Secrecy
36
Definition: Open Public Ledger
Distributed public record of transactions that supports the integrity of blockchains.
37
Definition: Blockchain
Expanding list of transactions protected by cryptography.
38
Definition: Blocks, [In blockchain]
It's a record of a transaction.
39
How are the blocks linked criptographycally? [Blockchain]
The hash value of the previous block in the chain is added to the hash calculation of the next block in the chain.
40
What is the information stored in a block?
- Time - Date - Parties involved - A unique hash that separates the block from other blocks on the chain
41
What are the applications of blockchain?
Financial transactions Legal contracts Copyright and Intelectual property Online voting systems Identity Management System
42
Definition: Mining [In blockchain]
It's the process of adding block to the chain, by generating the 64-digit hexadecimal based hash
42
What are the most common cryptographic attacks?
1. Dictionary Attack 2. Collision Attack 3. Birthday Attack 4. Downgrade Attack
43
Definition: Dictionary Attack
The use of a list of words and phrases to try to guess the decryption key.
44
Definition: Collision Attack
A collision attack tries to find two inputs that produce the same hash value. Done to fake digital signatures
45
Definition: Birthday Attack
This attack combines a collision attack and a brute-force attack. The name is taken from the birthday probability math problem.
46
Definition: Downgrade Attack
Forcing systems to use an older, less secure communication protocol.
47
Definition Cryptographic primitive
Single hash function, symmetric or asymmetric ciphers
48
Definition: Key Streching
Salts an encryption key, and converts it to a longer and disordered key
49
What are the most common hash uses?
1. File Integrity 2. Digital Signaturee 3. Secure Logon Credential exchamge
50
Definition: Hash collision
Hashing is a good file verification method, but it is not perfect. Depending on the algorithm used, there is a potential for hash collisions.
51
Most popular hashing algorithm
SHA MD5 HMAC RIPEMD
52
Acronym: SHA
Secure Hashing Algorithm
53
Acronym: MD5
Message-Digest Algorithm 5
54
Acronym: HBMSC
Hash-Based Message Authentication Code
55
What are the 3 states of data?
1. Data in transit 2. Data at rest 3 . Data in use [RAM, registers]
56
What are the types of disk and file encryption?
1. Full-disk Encryption and partition encryption 2. Volume and file encryption 3. Database encryption 4. Database-level encryption 5. Record-level encryption
57
What are the most common data transport encryption? And where are they used?
1. WPA (Wi-fi) 2. IPSec (VPN) 3. TLS (Internet)
58
Acronym: WPA
Wi-Fi Protected Access
59
Acronym: IPSec
Internet Protocol Security
60
Acronym: TLS
Transport Layer Security
61
Acronym: EFS
Encrypting File System
62
Definition: Encrypting File System - EFS
EFS combines the speed of symmetric encryption with the convenience of asymmetric encryption using a process called key encapsulation.
63
Definition: Pretty Good Privacy (PGP)
PGP is a product by Symantec that encrypts devices
64
Definition: GNU Privacy Guard (GPG)
GNU Privacy Guard (GPG) is an encryption tool that encrypts emails, digitally signs emails, and encrypts documents
65
Acronym: GPG
GNU Privacy Guard
66
Acronym: PGP [Encryption Software]
Pretty Good Privacy
67
Acronym: PKI
Public Key Infrastructure
68
Definition: Public Key Infrastructure
Framework that establishes trust in the use of public key cryptography to sign and encrypt messages via digital certificates. Aims to prove that the owners of public keys are who they say they are
69
Difinition: Digital certificate
Public assertion of identity validaded by a certificate authority (CA)
70
Acronym: CA
Certificate Authority
71
Definition: Certificate Authority
Entity that guarantees a digital certificate's validity Comodo, DigiCert, GeoTrust, IdenTrust, and Let's Encrypt.
72
What standard is used on Digital Certificates?
X.509 standard Approved by the International Telecommunications Union Standardized by the Internet Engineering Task Force
73
What are the digital certificate's attributes? What information does it hold?
1. Version 2. Serial Number Signature algorithm [Cryptographic Algorithm] 3. Issuer - CA 4. Valid From and Valid To 5. Subject 6. Public Key [Encryption algorithm]
74
Aside from expiration, what other reasons a certificate might be invalidated?
1. The organization no longer exists. 2. The private key has been compromised. 3. The issued certificate is discovered to be fake.
75
Acronym: CRL
Certificate Revocation List
76
Definition: Certificate Revocation List - CRL
Blacklist of expired or untrustworthy certificates maintained by CAs
77
Acronym: OCSP
Online Certificate Status Protocol
78
Definition: Online Certificate Status Protocol - OSCP
Internet protocol used to determine the validity or state of a certificate.
79
Why use OSCP rather than CRL?
- Faster validation - No need to download the entire CRL. - A grace period for expired certificates.
80
List the certificates types
1. Root certificate 2. Subject Alternative Name (SAN) certificate 3. Wildcard certificate 4. Code-signing certificate 5. Self-signed certificate 6. Email certificate 7. User and computer certificate
81
Definition: Root certificate
Emitted by a CA, basically a self-signed certificate
82
Definition: Subject Alternative Name (SAN) certificate
Allows organizations to use the same certificate for different domain names
83
Definition: Wildcard certificate
Similar to SAN certificate, instead of multiple domain names allows the use for different subdomains
84
Definition: Code-signing certificate
Used by app developers to prove their application is legitimate.
85
Definition: Self-signed certificate
Self-signed certificates are certificates that have not been validated or signed by a CA.
86
Definition: Email certificate
Used to secure email communication.
87
Definition: User and computer certificate
User and computer certificates are used in a network environment to identify and validate specific users or computers.
88
Acronym: CSR
Certificate Signing Request
89
Definition: Certificate Signing Request - CSR
The CSR is a file containing the information the subject wants to use in the certificate, including its public key, sent to the CA to sign.
90
Acronym: FQDN
Fully Qualified Domain Name
91
What is the field SAN used for?
Structured to represent different types of identifiers, including FQDNs and IP addresses.
92
What is the field CN - Common Name
Previous used to identify the FQDN, it's now deprecated
93
What are the attributes of a CRL - Certificate Revocation List?
1. Publish Period 2. Distribution Point(s) 3. Validity Period 4. Signature - the CRL is signed by the CA
94
Definition: Root of Trust Model
Defines how users and different CAs can trust one another. It's the root certificate
95
Definition: Single CA Model
In this simple model, a single root CA certificates directly to users and computers.
96
Definition: Hierarchical model - Third Party CAs
The root CA issues certificates to one or more intermediate CAs. The intermediate CAs issue certificates to subjects (leaf or end entities).
97
Definition: Certificate chaining/Chain of trust
Each leaf certificate can be traced to the root CA along the certification path, in the hierarchical model.
98
What are the main methods to keep Private Key Safety
1. Key archival 2. Key escrow
99
Definition: Key archival Method
The private key is sent securely and backed up by the CA.
100
Definition: Key escrow
Refers to archiving a key (or keys) with a third party. A key can be split into more parts. Each part can be held by separate escrow providers, reducing the risk of compromise.
101
Acronym: KRA
Key Recovery Agent
102
Definition: Key Recovery Agent - KRA
Account with permission to access a key held in escrow, usually required two or more KRA to authorize the operation.