PKI Flashcards
(30 cards)
What are the functions of RSA?
- Choose 2 large prime numbers… P & Q
- Multiply them… N=P*Q
- Select number (E) where E is less than N and is roughly prime
- Find number D where D=(ED-1) mod (P-1)(Q-1)=0
- Distribute E & N as public key and D as private key
What is Merkle-Hellman Knapsack?
Early asymmetric method similar to RSA but used super-increasing sets. Broken in 1984.
What is El Gamal?
Implementation of Diffie-Hellman algorithm. (I mod)… (You mod). Strength was that it was public domain. Weakness was that it doubled message length.
What is Elliptic Curve?
Logarithmic function that allowed much smaller key length (160bits) than RSA (1088 bits).
What must a hash function perform?
- Input is any length.
- Output is fixed.
- Hash function is easy to perform.
- Has function is one way (ie cannot be reverse engineered)
- Collision free (no dupes)
What is the digest and block size for SHA-1?
160 bit digest and 512bit block.
What is the digest and block for the 4 modes of SHA-2?
- .. 256 digest, 512 block
- .. 224 digest, 512 block
- .. 512 digest, 1024 block
- .. 384 digest, 1024 block
Is SHA-2 considered secure?
Yes
What is the digest and block size for MD4?
128 bit digest and 512bit block with 3 rounds of processing.
What is the difference between MD4 & MD5?
MD5 uses 4 rounds of processing.
What are the distinct goals of digital signatures?
- Non repudiation.
2. Messages are not altered during transit.
What 2 functions do digital signatures implement?
- Public key crypto
2. Hashing functions
What is HMAC?
Hashed Message Authentication Code… Does not implement non-repudiation.
What is the golden rule on which key to use?
When I am doing functions on myself (decrypt, sign) use my private key
When I want to deal with others (send, verify) use the other parties public key
What must a digital cert contain?
- Cert version
- Serial number from CA
- CA signature algorithm ID
- CA info
- Subjects name
- public key
What are some well known CA?
VeriSign Godaddy Geotrust Entrust Digicert
What is an RA?
Registration Authority will work with CA to verify subject.
What steps should you perform when presented with a digital cert?
- Determine if CA is trusted.
2. Verify cert is not on Certificate Revocation List (CRL)
Outline the technologies and implementations of PGP…
Commercial - IDEA (encryption) MD5 (digest)
Freeware - CAST (encrypt), SHA-1 (digest)
Who uses S/MIME?
Outlook/ Exchange
Mozilla
Max OSx
How does SSL go about its connection process?
- Initial connection utilizes the digital cert on webserver to determine identity.
- Browser creates a random symmetric key that is encrypted with server’s public key
- Server uses symmetric key for all future communication.
What is Steganography and when is it best used?
Hiding a message inside a large objects (bmp). Also used in watermarking. Does not impact the quality of the image.
What is Link encryption?
Low level encryption method. lower level of OSI… End to end
What is end-to-end encryption and how is it different than link encryption?
Operates at a higher level of OSI stack.