Security Architecture Domain 3 Flashcards

1
Q

Functions such as MDS, SHA-256, and the new SHA-3 are used for

A

integrity to protect against unauthorised modification of data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

The four fundamental goals of cryptography

A

Confidentiality
Integrity
Authentication
Non-repudiation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

ISO/IEC 18033-2:2006 specifies

A

encryption systems
(ciphers) for the purpose of data confidentiality

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

ISO/IEC 11770-1:2010 defines

A

a general model of key management that is independent of the use of any particular cryptographic algorithm

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

ISO 11568 series specifies

A

the principles for the management of keys used in cryptosystems implemented within the retail-banking environment

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

ISO/IEC 13888 is applicable when

A

non-repudiation is required for key management

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Messaging security standards include:

A

Secure Multi-Purpose Internet Mail Extensions (S/MIME):
Privacy-Enhanced Mail (PEM) PEM was never widely used for securing e-mail
Only PEM’s definition of header field format (PEM format) has
found use as a common means of representing digital certificates
in ASCII form.
Pretty Good Privacy (PGP)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Secure Multi-Purpose Internet Mail Extensions (S/MIME):

A

This extension of the MIME standards that specify e-mail formatting and encapsulation adds encryption of message content. S/MIME also uses a hashing algorithm for message integrity, public key certificates for message authentication, and digital signatures to
provide non-repudiation of origin”.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

PGP provides message authentication
by binding a public key to an e-mail address where the public
key is

A

distributed to a community of users who trust each other, commonly known as a web of trust.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

IPSec includes two protocols

A

Authentication Header (AH) and Encapsulating Security Protocol (ESP).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

AH: Authentication Header provides data origin authentication and data integrity but does not provide

A

confidentiality for the IP payload and header that it protects.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

ESP Encapsulating security policy, provides data origin authentication and data integrity, and it offers …

A

confidentiality for the payload it protects

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Secure TCP/IP communication is not limited to IPSec. What else are additional cryptographic protocols that provide communications security for TCPIP

A

Transport Layer
Security (TLS) and its predecessor, Secure Sockets Layer (SSL)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

VPNs are implemented in the following architectures:

A
  • Remote Access VPN
  • Site-to-Site VPN:
  • Extranet VPN: when one or more
    separate organizations are connecting to that organization over IP.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

By default, PPP does not provide any security or rely on any cryptographic controls. However, PPP does include

A

an optional authentication phase and an optional encryption feature, PPP Encryption Control Protocol (ECP)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

SSH operates at the _____ layer of the OSI model

A

application layer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

The most commonly used family of standards for Wireless Local Area
Networks (WLANs) is Institute of Electrical and Electronics Engineers (IEEE)
802.11’7. 802.11 originally relied on the ___________1________ security method to provide confidentiality and integrity. _____1_________
insecure due to the way it implements its ______2_________ algorithm

A

1 Wired Equivalent Privacy (WEP)
2 RC4 stream cipher

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Prior to the introduction of
802.1li, the Wi-Fi Alliance, a global nonprofit industry association, created
a protocol and certification program for wireless network components known
as _____1________, based on ___________

A

Wi-Fi Protected Access (WPA)
a draft of IEEE 802.11i,

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

The biggest difference between WPA and the 802.11i draft is that

A

WPA does not require support for the Advanced Encryption Standard (AES)
strong encryption algorithm. WPA allows many existing IEEE 802.11 hardware components that cannot support the computationally intensive AES encryption.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

WPA2 certification is based on
the mandatory elements of the IEEE 802.11i standard, but there are some
differences. WPA2 extends its certification program to include

A

interoperability with a set of common Extensible Authentication Protocol (EAP) methods.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Bluetooth optionally encrypts, but does not provide

A

integrity protection for the transmitted data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

True or false, it is easy to modify a transmitted bluetooth packet without being detected

A

True because only a simple CRC is added to each packet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

In version 2.0 and earlier of
the Bluetooth specification, pairing is performed over a non-encrypted channel,
allowing

A

a passive eavesdropper to compute the link key used for encryption.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

Version 2.1 of bluetooth introduced the use of

A

Elliptic Curve Diffie-Hellman (ECDH) public
key cryptography, which can be utilized by Bluetooth device developers for
protection against a passive eavesdropping attack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
The Bluetooth specification defines its own stream cipher called
EO
26
What is the problem with the EO stream cipher
Several weaknesses have been identified in Bluetooth's EO stream cipher, which is not a Federal Information Processing Standards (FIPS)-approved algorithm and can be considered nonstandard [SP800-121720 21
27
Version 3.0 + High Speed (HS) of the Bluetooth Core Specification was adopted by the Bluetooth SIG on
21 April 2009.
28
Bluetooth high speed is based on
Wi-Fi
29
A service provider hosting multiple clients in a data center may use encryptionfor privacy of data within a SAN. This can be done using
Fibre Channel Security Protocol (FC-SP)
30
An early use of cryptographic identification for distinguishing friendly aircraft was developed during WWII with the Identification, Friend or Foe (IFF) system
using coded radar signals to trigger a transponder on the aircraft. Modern military IFF transponders encrypt challenge and response messages
31
Similar to IFF, RFID relies on
use of a transponder, or an RFID tag
32
special-purpose interfaces such as the NSA-developed Crypto Ignition Key (CIK) used in the STU-III family of secure telephones [CIK] are examples of
Hardware-token-based technologies, and also include smart cards and USB tokens
33
Authentication protocols used by Point-to-Point Protocol (PPP) include
Password Authentication Protocol (PAP) Challenge-Handshake Authentication Protocol (CHAP). EAP Extensible Authentication Protocol
34
Of the Authentication protocols used by Point-to-Point Protocol (PPP) which is considered a weak authentication method and why
PAP is a weak authentication method, transmitting a cleartext password and static identifier that does not protect against replay attack.
35
Which is stronger out of PAP and CHAP and why
CHAP is stronger because it transmits a hash that is computed based on a random challenge value and shared secret, providing replay protection and a stronger level of authentication.
36
Which of the authentication protocols developed for PPP is actually a framework that supports a number of protocols
EAP
37
How are different authentication mechanisms implemented in EAP
In a variety of ways which are called EAP methods, eg. EAP-MD% and EAP-TLS
38
The approved standard IEEE P1619 addresses ______1___ and the approved standard IEEE P1619.1 is for ______2____
data storage and encryption on disk drives, data encryption on tape drives
39
One specification for protecting the decades old EDI transmitted over the Internet is
Applicability Statement 2 (AS2)
40
NSA Suite B is a subset of cryptographic algorithms approved by NIST including those for
Encryption, hashing, digital signatures, and key exchange.
41
What is Ek(M) = C
A simple way of representing the Encryption Functions
42
Advanced Encryption Standard (AES) Blowfish Data Encryption Standard (DES) IDEA RC2, RC4, RCS, and RC6 Triple-DES (3DES) Are examples of what
Symmetric algorithms
43
Symmetric algorithms tall into two categories:
block ciphers and stream ciphers.
44
In stream ciphers how is plaintext encrypted
one bit, byte or word at a time using a rotating stream of bits from the key
45
Symmetric key algorithms that operate as block ciphers are used in one or more modes of operation. Each block cipher mode provides a different level of
security, efficiency, fault tolerance, or in some cases, provides a specific protection benefit such as confidentiality or authentication.
46
Name some common block cipher modes of operation
Electronic Code Book (ECB) Mode: Cipher Block Chaining (CBC) Mode: Counter(CTR) Mode:
47
Which is the least complex of the common Block Cipher Modes of operation
Electronic Code Book Mode
48
Block ciphers typically include an __________________, a block of bits added to ensure that identical plaintext messages encrypt to different ciphertext messages.
Initialization vector
49
Block Cipher Modes Electronic Code Book (ECB) Mode
each block is operated on independently, and an IV is not used. Because identical plaintext blocks result in identical ciphertext, this mode is not useful for providing message confidentiality.
50
Block Cipher Modes Cipher Block Chaining (CBC) Mode
Adds an IV and uses a chaining method such that results of the encryption of previous blocks are fed back into the encryption of the current block. This makes CBC useful for message confidentiality.
51
Which of the block cipher modes are not useful for confidentiality?
Electronic Code Book (ECB) mode
52
Block Cipher Modes. Cipher Feedback (CFB), Output Feedback (OFB), and Counter (CTR) Mode .
unique cipher text given identical plaintext blocks, useful for message confidentiality. they can operate as a stream cipher.
53
Because these modes employ a block cipher as a keystream generator, they can operate as a stream cipher.
Cipher Feedback (CFB), Output Feedback (OFB) and Counter (CTR) mode
54
When is the ability to operate as a stream cipher useful
In applications that require low latency between the arrival of plain text and the output of corresponding ciphertext
55
What do the following modes not offer Electronic Code Book (ECB) Mode Cipher Block Chaining (CBC) Mode Cipher Feedback (CFB), Output Feedback (OFB), and Counter (CTR) Mode
Integrity protection
56
Name the block cipher modes that include additional security eg. authenticity and integrity
Cipher-Based Message Authentication Code (CMAC) Mode Counter with Cipher Block Chaining-Message Authentication Code (CCM) Mode: This mode can provide assurance of both Galois/Counter Mode (GCM)
57
Who invented the RC algorithms
Ron Rivest
58
RC2 was found vulnerable to a
related key attack
59
Invented by NSA, the now-declassified _________ algorithm uses a 64-bit block size with 80-bit key length.It was intended for implementation in tamperproof hardware using the Clipper chip as part of a now-defunct key escrow program that would allow U.S. government agency decryption of telecommunications.
Skipjack
60
_______1________ was one of the finalists that were not selected for the AES standard. Cryptanalysis of _____1_____ continues to reveal that it is _______2_______
Twofish Secure
61
_____________ are generally less complex than block ciphers
stream ciphers
62
Examples of synchronous stream ciphers are
RC4 and HC-128
63
Stream ciphers may be viewed as approximating the function of a one-time pad or Vernam cipher, which uses
a random keystream of the same length as the plaintext.
64
What makes a Vernam cipher cumbersome and impractical
The size of the keystream which is the same length as the plaintext
65
Asynchronous stream ciphers are less susceptible to attack by
attempting to introduce predictable error.
66
Examples of asynchronous stream ciphers are
ciphertext autokey (СТАК) and stream ciphers based on block ciphers in cipher feedback mode (CFB).
67
Asymmetric cryptosystems rely heavily on mathematical functions known as _______1_______
trapdoor functions
68
Why are trapdoor functions so called
They are easy to apply in one direction but extremely difficult to apply in the reverse.
69
The idea that separate keys for encryption and decryption could be used was presented in 1976 by
Whitfield Diffie and Martin Hellman [DH].
70
The Diffie-Hellman (DH) key agreement protocol, also called the ______, is a method of ______2_______
1. exponential key agreement, 2. which is a method of exchanging secret keys over a nonsecure medium without exposing the keys.
71
The DH protocol is based on the difficulty of calculating
discrete logarithms in a finite field.
72
While DH provides confidentiality for key distribution, the protocol does not provide (1) this means that (2) is required
1. authentication of the communicating parties. 2. a means of authentication such as digital signatures must be used to protect against a man-in-the-middle attack.
73
The idea of a public-key cryptosystem and its use in digital signing was presented by
Ron Rivest, Adi Shamir, and Leonard Adleman in 1977 [RSA].
74
Recovering the plaintext from RSA encryption without the key would require
factoring the product of two large primes, forming the basis for the security
75
In RSA encryption the keys must be generated in such a way that it is computationally infeasible to
factor them
76
Cryptosystems employ ________1______, which are the basic mathematical operations on which the encryption procedure is built.
cryptographic primitives
77
Primitives by themselves do not provide security. A particular security goal is achieved by employing the cryptographic primitives in what is known as
a cryptographic scheme.
78
Cryptosystems built using RSA schemes may be used for
confidentiality, signing to provide authenticity, or key exchange.
79
Another popular approach to public-key cryptography, which is more computationally efficient than either RSA or DH, is
elliptic curve cryptography (ECC).
80
Recommendations by the National Institute of Standards and Technology (NIST) for protecting AES 128-bit private keys is to use RSA and DH key sizes of 3072 bits, or elliptic curve key size of
256 bits
81
ECC schemes are based on the mathematical problem of
computing discrete logarithms of elliptic curves.
82
Because the algorithm is very efficient, ECC can be very useful in
applications requiring limited processing power such as in small wireless devices and mobile phones.
83
Aside from RSA and ECC other asymmetric cryptosystems include.
El Gamal and Cramer-Shoup
84
Asymmetric cryptosystems that have been proved insecure and should not be used are those based on the
knapsack algorithm.
85
Public key cryptosystems will continue to be necessary when secret key exchange is required. Common software protocols and applications where they are used include
IPSec, SSL/TLS, SSH, and PGP.
86
Hash functions are cryptographic algorithms that provide message integrity by producing a condensed representation of a message, called a
message digest.
87
At a minimum, the following properties are present in a hash function:
* Compression * Ease of computation * Preimage resistance * Second preimage resistance * Collision resistance
88
Explain the following minimum requirement of hash functions * Compression
The hash function H transforms a variable-length input M to a fixed-length hash value h.
89
Explain the following minimum requirement of hash functions * Ease of computation
Given a hash function H and an input M, the hash value h is easy to compute.
90
Explain the following minimum requirement of hash functions Preimage resistance
Given a hash function h, it is computationally infeasible to compute what the input M was. This is known as the "one-way" property of hash functions.
91
Explain the following minimum requirement of hash functions Second preimage resistance
For a given input M, is computationally infeasible to find any second input which has the same hash value h.
92
Explain the following minimum requirement of hash functions Collision resistance
For hash function h, it is computationally infeasible to find any two distinct inputs that produce the same hash value.
93
One-way functions are limited in their ability to provide collision resistance, however. A popular means of constructing the hash function and strengthen its collision resistance is
the Merkle-Damgärd technique, which involves breaking the message input into a series of smaller blocks
94
_______________________________ designed by Ron Rivest in 1991, is one such hash function based on a one-way algorithm and utilizing Merkle- Damgärd construction.
MD5 (Message Digest algorithm 5),
95
While MD5 has been widely used, it has been found to be prone to
collision weakness and is thus insecure
96
A common replacement recommended for MD5, and which is also widely used, is _________________ designed by the United States National Security Agency (NSA).
SHA-1 (Secure Hash Algorithm),
97
Which of MD5 and SHA1 uses a one way function and the Merkle-Damgärd technique to avoid collisions
They both do
98
What is an alternative to SHA-1 that also produces a 160 bit digest
RIPEMD-160, designed by Hans Dobbertin,
99
Aside from a one way function and the Merkle-Damgärd technique to avoid collisions what is another way of producing a hash
By using a block cipher algorithm
100
How can a block cipher work as a hash function
Block ciphers operate by encrypting plaintext using a private key to produce ciphertext. The ciphertext cannot be used by itself to recreate the plaintext, This resembles the one-way property of a hash function. .
101
Why is a block cipher not a complete hash function
The block cipher's secret key and decryption algorithm would allow reconstruction of the plaintext, Hashes need to be fixed length
102
To make a block cipher into a secure cryptographic hash function ...
some additional operations must be added to a block cipher
103
Example of a block cipher hash functions are
- MDC-2 (Modification Detection Code 2, sometimes called Meyer-Schilling), developed by IBM, which produces a 128-bit hash. - Whirlpool, which produces a 512-bit hash
104
Which function was adopted by the International Organization for Standardization (ISO) in the ISO/IEC 10118-3:2004
The Whirlpool hash
105
Another use of a block cipher is in a _____, which is a key-dependent hash function.
MAC (Message Authentication Code)
106
Another use of a block cipher is in a MAC, which is a
key-dependent hash function
107
A MAC adds to the input message the secret key used by the symmetric block cipher, and the resulting output is a fixed-length string called the MAC. Adding the secret key to the message produces ....
origin authentication
108
A MAC may also be derived using a hash function, where the hash function is modified to incorporate use of a secret key to provide origin authentication and integrity. This is known as
an MDx-MAC scheme,
109
What is an MDx-MAC scheme
where the hash function is modified to incorporate use of a secret key to provide origin authentication and integrity.
110
The most common form of MAC algorithm based on a block cipher employs cipher block chaining, and is known as .
a CBC-MAC Cipher Block Chaining
111
Give an example of a MAC derived from a hash function
A Hashed Message Authentication Code (HMAC) is another case of a MAC derived using a hash function.
112
MACs can be derived using
Block Ciphers or Hash Functions
113
How does HMAC work
In an HMAC, the underlying hash function is not modified, but is treated as a "black box." HMAC uses any iterative hash function and adds a secret key to the input message in order to obtain origin authentication and integrity.
114
A digital signature may be thought of as a MAC that uses asymmetric cryptography, because a digital signature uses
a private signing key and a public verification key.
115
Why does a digital signature not provide confidentiality
Because the digest is signed (the hash) not the original record.
116
What can a digital signature provide
Origin authentication, non-repudiation and integrity
117
How does a digital signature provide non-repudiation
If the digest can be decrypted using the public key then it was signed using the private key
118
A digital signature scheme contains the following elements
Cryptographic hash function Key generation algorithm Signing algorithm Verification algorithm
119
When it comes to the design and implementation of cryptographic systems, the main school of thought is that if the system is going to be designed for use commercially, then it cannot be a
proprietary system, as the ability to test it and probe for weaknesses would be a problem.
120
What is crypto-tax?
the computational overhead on a system that uses cryptography
121
Why Was Kerberos v4 Deprecated?
Weaknesses in the Data Encryption Standard (DES) Lack of forward secrecy Vulnerability to replay attacks
122
What were the problems with DES that resulted in the deprecation of Kerberos 4?
* Kerberos v4 relied exclusively on DES (Data Encryption Standard) for encryption. * NIST (National Institute of Standards and Technology) deprecated DES in 2005 due to its small 56-bit key size, which was easily brute-forced. * Modern attacks (like rainbow tables and parallelized brute-force attacks) made DES insecure.
123
What did Kerberos v5 do
- Removing DES (which NIST deprecated in 2005). - Adding AES support for modern encryption. - Improving security against replay attacks, ticket forgery, and session key compromise.
124
In the real world what is the biggest problem in cryptography
key management
125
One of the principles of modern cryptography requires that keys not appear in
cleartext outside the crypto module
126
One of the important characteristics of the keys is a crypto period. It is defined [NISTSP800-57-1] as the time span during which
a specific key is authorized for use by legitimate entities
127
A successful brute force attack on a symmetric key algorithm, which in the case of perfect key entropy essentially consists of an exhaustive search of all the keys, would require
on 2 to the power of N, divided by 2, where N is a size of the key in bits cycles
128
What are the phases of a key life-cycle that should be considered
Preoperational phase Operational phase Postoperational phase Key destruction
129
In a key lifecycle what happens in the pre-operational phase
The key is not generated yet, but preactivation processes are taking place. It may include - registering a user's attributes with the key management system, - installing the key policies, and - selecting algorithms and key parameters, - initial installation or update of the software or hardware cryptographic module with initial key material
130
A seed key, in its turn, is defined as
"a secret value used to initialize a cryptographic function or operation."
131
There are two basic classes of Random Number Generators in cryptography namely
Deterministic and non-deterministic
132
A deterministic RNG consists of
an algorithm that produces a sequence of bits from an initial value called a seed.
133
A nondeterministic RNG produces outout that is dependent on
unpredictable physical source that is outside human control.
134
In encryption and decryption applications, the RSA private key is used to _________ data and the RSA public key is used to ________ the data. As described in [FIPS
decrypt, encrypt
135
For symmetric cryptography, the keys may be generated from a random number generation method or
regenerated from the previous key during a key update procedure.
136
If symmetric cryptography is used for wrapping the keys, those key-wrapping keys should be distributed via
a separate channel of communication.
137
One of the main advantages of using public and private key cryptography is
the easier distribution of keys
138
Distributing static public keys does not require encrypted channels or split knowledge techniques, but it has its own specifics. A relying party, who obtains the keys either for verifying an owner's signature or for encrypting a message for the key owner, should have a high level of assurance that, - The key really belongs to the subject. - The key is associated with certain attributes belonging to the subject. - The key is valid. - The key is allowed by its policy to be used for the intended purpose. All of this is achieved through
PKI Public Key Infrastructure
139
What does PKI do for public keys
Issues X509 certificates containing the subjects public keys and attributes
140
The protection of keys in storage should provide
- Integrity - Confidentiality - Association with application and objects - Assurance of domain parameters - Availability
141
The protection of keys in storage should provide Association with application and objects what does this mean
Making sure that the key belongs to a designated object; e. g., encapsulating public keys with the object DN in a signed certificate or storing private signing keys in the object's protected key store.
142
The protection of keys in storage should provide Assurance of Domain Parameters what does this mean
Assurance of Domain Parameters (making sure that domain parameters used in the PKI keys exchange are correct).
143
________________is required when an attempt is made to access the maintenance interface or tamper with a device meeting FIPS 140-2 level 3 requirements [FIPS 140-2].
Automatic zeroization
144
If it is believed that an encryption key of data at rest was compromised, ________________________________. This whole process is called ________________
this data should be reencrypted with a new key key rotation
145
What is a way of changing keys without requiring new key distribution or exchange between parties
applying a non-reversable function to an existing key
146
Generally, escrow is defined as
something delivered to a third person (usually called an "escrow agent") to keep, and to be returned to the delivering entity
147
How does an escrow system operate in cryptography applications
In cryptography applications, a key escrow system operates with two components of one key, and these two components are entrusted to two independent escrow agents.
148
In order to support escrow capabilities in telecommunication, the U.S. government adopted the symmetric encryption algorithm _____________ and a _________________________ method, which presents one part of a key escrow system enabling decryption of encrypted telecommunications.
SKIPJACK Law Enforcement Access Field (LEAF)
149
Decryption of lawfully intercepted telecommunications may be achieved through the acquisition and use of
The LEAF, the decryption algorithm, and the two escrowed key components.
150
Key backup and recovery is part of the
KMS contingency plan
151
When should key backup be considered.
Only if there are no other ways (such as rekeying or key derivation) to provide continuity
152
a full-fledged PKI deployment often involves two distinct key pairs
1. Signing Key Pair * Private Key (Signing Key): Stored securely on a server or HSM. Used for signing certificates, documents, or authentication challenges. * Public Key (Verification Key): Sent to the Certificate Authority (CA) and embedded in an X.509 certificate. 2. Encryption Key Pair (optional but common in PKI deployments) * Private Key (Decryption Key): Used to decrypt messages encrypted for the entity. * Public Key (Encryption Key): Distributed in a certificate to allow others to encrypt messages for the subscriber.
153
What is an EE in PKI
End Entity
154
In PKI what is a CP
Certificate policy
155
What is the purpose of a CP
* Specifies who can request, issue, and use a certificate. * Defines trust levels and security controls applied to the certificates. * Ensures compliance with industry standards (e.g., NIST, WebTrust, ETSI). * Helps relying parties (e.g., browsers, applications) understand the trustworthiness of a certificate.
156
What is a CPS
A Certificate Practice Statement
157
If a CP Defines what policies apply to certificates what does the CPS do?
Defines how the CA enforces those policies
158
What is the difference in scope between the CP and the CPS
CP - High level policy framework CPS - Operational details
159
What is the difference in content between the CP and the CPS
CP - Trust levels, authentication requirements, intended use CPS - Key management procedures, certificate issuance process
160
When talking about PKI certificates and the keys, we should always remember the guidance provided in
CP and CPS documents
161
There are many steps between the moment when a subscriber applies for a PKI certificate and the final state, when keys have been generated and certificates have been signed and placed in the appropriate locations in the system. These steps are described either explicitly or implicitly in the
PKI CPS.
162
In PKI what is a CPF
Certificate Policy Framework, the rules governing CPs in an organisation
163
The most reliable, but most expensive method to authenticate an EE for PKI registration is
face-to-face authentication.
164
Technically, the sanctioned and expected usage of the certificate is represented in the X.509 certificate ___________ attribute.
"Key usage"
165
Name three models that provide chains of trust for PKI applications supporting multiple communities
1. Subordinate Hierarchy (Two or more CA's in a hierarchical trust relationship) 2. Cross-certified mesh (CA's cross certify) 3. Certificate Chains - the validity of an issuing CA's certificate depends on the validity and life span of the whole certificate chain
166
Which PKI trust model is good for internal enterprise applications but may be hard to implement between enterprises
The subordinate hierarchy
167
The _______________________ is probably the most general model of trust between CAs and participating PKIs.
Cross-certified mesh
168
When a cross-certified mesh is too dynamic and grows too fast to include n CAs, it may not scale well because it is supposed to include and support n(n - 1) cross-certifications and also because of potentially ambiguous verification paths. What model may be helpful in this case?
Bridge CA
169
How does the bridge CA model allow participating parties to mutually validate each other's certificate paths.
By creating a mesh of participating root CAs
170
The most well-known example of a Trusted List model is
a set of publicly trusted root certificates embedded in the Internet browsers.
171
CRL
Certificate Revocation List
172
What is the traditional CRL Model
A relying party checks a certificate against the latest published CRL. If the certificate is not in the CRL, it is assumed valid.
173
Why is the response time variable in the traditional CRL model
The relying party may or may not have the current CRL in cache.
174
What is the problem with the traditional CRL model
In applications with a large number of subscribers and relying parties and with a high revocation rate, the CRL request rate can be very high, and CRLs themselves can be very long. This may introduce network and CRL-repository performance problems.
175
When would cached CRL requests peak? How could this be mitigated?
When parties request it for the first time, and when cached CRLs expire. Set different expirations for overissued CRLs
176
How does a segmented CRL help with peak times.
Reducing the size of the CRL or the portion of the CRL that the party needs to download
177
What are some ways of mitigating peaks in CRL traffic
Expiring CRLs at different rates Segmenting CRLs for smaller downloads Delta CRLs
178
What is an alternative to the CRL model
Online certificate status protocol OCSP
179
What is a limitation of the OCSP
Cannot be used offline
180
______________ is a way of establishing trust between entities that are subscribers for different PKI certificates services and which have been issued certificates by different nonrelated CAs.
Cross-certification
181
In Cross-certification complete understanding of Certificate Policy and Practice of each CA is required, because each party needs to know
how much it can trust to the certificates issued by another CA, what are the enrolment, issuing and revocation procedures of another
182
Does cross-certification need to be mutual?
No
183
In cross certification What is issued by company A after going through the process of trusting company B
A cross-certificate or cross-signed certificate
184
What is inside a cross-certificate?
Issuer: Company A Subject: Company B Public Key: Public Key of Company B's root CA Signature: Company A Validity period:how long the certification is valid for
185
Attack models - What is required for a ciphertext-only attacks
a large volume of ciphertext encrypted with the same algorithm
186
Attack models - What is required for a known-plaintext attack
some plaintext and the corresponding ciphertext
187
Attack models - Chosen-plaintext
Choosing the plaintext with the corresponding ciphertext
188
Attack models - Chosen-ciphertext
Chosen-ciphertext attack: This attack involves choosing the ciphertext to be decrypted and gaining access to the resulting plaintext.
189
Variations on the attack models can be used in a controlled environment to reveal weaknesses in a cryptosystem and analyze an algorithm's strength. Two common cryptanalyst methods applied to the testing of symmetric ciphers are the techniques of
differential cryptanalysis and linear cryptanalysis
190
AES in ECB mode (Electronic Codebook) is vulnerable to Chosen Plaintext Attack because
it encrypts identical plaintext blocks into identical ciphertext blocks.
191
What is the mitigation for the weaknesses of AES in ECB mode
Use a stronger encryption mode like AES-CBC or AES-GCM, which add randomness (IV or nonce) to prevent patterns.
192
What is the differential cryptanalysis method?
It is a chosen-plaintext attack where an attacker encrypts pairs of plaintexts with a known difference (ΔP) and observes how this difference propagates through the encryption process.
193
______ was successfully broken using differential cryptanalysis, but ______ remains secure because the number of required plaintext pairs is beyond practical limits.
DES AES
194
Linear cryptanalysis
Attackers try to find patterns between the plaintext, ciphertext, and secret key. If an attacker can find even a slight pattern, they can use a large amount of data to gradually figure out the secret key.
195
What type of attack is a birthday attack
Hash function attack
196
What is the goal of a hash function attack? Why is this bad?
Find two different inputs (M1 and M2) that produce the same hash (H). If two different documents or files have the same hash, an attacker can swap one for another without detection.
197
What is a network-based cryptanalytic attack?
Attacks that target more than just the cryptographic algorithm by exploiting weaknesses in areas such as communication protocols or transmission methods
198
Name three network-based cryptanalytic attacks
- Man in the middle attack - Replay attack - Traffic analysis attack
199
How is SSH operating in interactive mode vulnerable to a Traffic Analysis Attack
Every keystroke is transmitted as a packet, traffic analysis can get the password length by counting the packets
200
Two general countermeasures to protect against traffic analysis
1. traffic padding 2. anonymising message senders using proxy servers, (making the source and destination of communicating parties more difficult to determine)
201
In a cryptographic system where multiple secret keys are necessary, for example, with a tape encryption appliance device, it is common to encrypt individual working keys with a top-level master key. The storage of the top-level secret key used in such a cryptosystem can be done using key shares, a technique also known as ___________ This involves
split-knowledge. splitting the key into multiple pieces and granting access to each share to separate individuals.
202
The following attacks against keys are variations on the cryptanalytic attack models and are also important in validating cryptosystems:
Meet in the middle attacks Related key attacks
203
How does the "Meet in the middle" attack against keys work
It reduces the time needed to break double encryption schemes (e.g., Double DES) by exploiting the independent encryption and decryption steps. Instead of brute-forcing the full key space, Meet-in-the-Middle splits the attack into two halves
204
Related key attacks
The attacker exploits predictable relationships between multiple encryption keys to break a cipher more efficiently than brute force.
205
These attacks mainly deal with obtaining and analyzing information that originate from the cryptosystem hardware rather than weaknesses in the cryptographic algorithm.
Side-channel attacks
206
Three types of side channel attack
1. Timing attack - how long does the cryptographic operation take to execute 2. Differential Fault Analysis 3. Differential power analysis
207
Explain the timing attack
A side channel attack By analyzing small variations in execution time, the attacker can extract information about the secret key used in the encryption process. Cryptographic operations (e.g., RSA, Diffie-Hellman) take slightly different amounts of time based on key bits and input values.
208
Explain differential fault analysis
a side-channel attack where an attacker injects small faults (errors) into a cryptographic computation and observes how the faulty outputs differ from correct outputs. By analyzing these differences, the attacker can recover secret keys faster than brute force.
209
Explain differential power analysis
In this method, power consumption measurements in a hardware device such as a smart card are made during encryption operations while ciphertext is recorded.
210
a digital signature scheme must employ an acceptable cryptographic hashing function, such as those specified in
NIST FIPS 180-4, the Secure Hash Standard
211
Determining if cryptographic controls meet governmental or corporate standards is a function of
compliance monitoring.
212
In the PCI standard the essential requirement in protecting card holder data is
not to store it at all if possible
213
1. What cryptographic hash function would be the acceptable replacement for MD4? A. MD5 B. RIPEMD C. RIPEMD-160 D. SHA-1
The correct option is C This strengthened version of RIPEMD was successfully developed as a collision-resistant replacement for other hash functions including MD4, MD5 (Option a), and RIPEMD (Option b) [Collisions]. Because collisions were also announced in SHA-1 (Option d) [SHA-1 Collisions], RIPEMD-160 would be the acceptable replacement [RIPEMD-160].
214
2. An IPSec Security Association (SA) is a relationship between two or more entities that describes how they will use security services to communicate. Which values can be used in an SA to provide greater security through confidentiality protection of the data payload? A. Use of AES within AH B. SHA-1 combined with HMAC C. Using ESP D. AH and ESP together
The correct option is C Encapsulating Security Protocol (ESP) also provides data origin authentication and data integrity, and also offers confidentiality for the IP payload it protects.
215
3. Suppose a secure extranet connection is required to allow an application in an external trusted entity's network to securely access server resources in a corporate DMZ. Assuming IPSec is being configured to use ESP in tunnel mode, which of the following is the most accurate? A. Encryption of data packets and data origin authentication for the packets sent over the tunnel can both be provided. B. ESP must be used in transport mode in order to encrypt both the packets sent as well as encrypt source and destination IP Addresses of the external entity's network and of the corporate DMZ network. C. Use of AH is necessary in order to provide data origin authentication for the packets sent over the tunnel. D. Source and destination IP Addresses of the external entity's network and of the corporate DMZ network are not encrypted.
The correct option is A ESP optionally provides a means of data origin authentication, and while it can be nested within AH, ESP does not require AH for this (Option c) [RFC 2406]. With ESP operating in transport mode (Option b), the original IP headers are not encapsulated within the ESP header, and the original IP addresses (source and destination IP addresses of the external entity's network and of the corporate DMZ network) are in fact not encrypted. With ESP operating in tunnel mode, the original IP addresses are actually encrypted (Option d).
216
Is it possible to provide both encryption of data packets and data origin authentication for the packets in ESP tunnel mode
Yes, ESP optionally provides a means of data origin authentication, and while it can be nested within AH, ESP does not require AH for this
217
In ESP when are the original IP addresses (source and destination IP addresses of the external entity's network and of the corporate DMZ network) not encrypted
In Transport mode
218
4. What is the BEST reason a network device manufacturer might include the RC4 encryption algorithm within an IEEE 802.11 wireless component? A. They would like to use AES, but they require compatibility with TEEE 802.11i. B. Their product must support the encryption algorithm WPA2 uses. C. RC4 is a stream cipher with an improved key-scheduling algorithm that provides stronger protection than other ciphers. D. Their release strategy planning includes maintaining some degree of backward compatibility with earlier protocols.
The correct option is D RC4 is widely used, and the manufacturer wants to make its product compatible with WPA or even WEP, which use RC4. This does not mean they do not include AES; in fact, they would likely do so in the case of a new product, because IEEE 802.11i does in fact use AES for encryption (Option a). Option b is incorrect because WPA2, which is based on IEEE 802.11i, uses AES. Option c is incorrect because while RC4 is a stream cipher, it has a weak key-scheduling algorithm and offers less protection than other ciphers such as AES [WPA].
219
True or false RC4 is a stream cipher with an improved key-scheduling algorithm that provides stronger protection than other ciphers.
It is a stream cipher but it it has a weak key-scheduling algorithm
220
5. What is true about the Diffie-Hellman (DH) key agreement protocol? A. The protocol requires initial exchange of a shared secret. B. The protocol depends on a secure communication channel for key exchange. C. The protocol needs other mechanisms such as digital signatures to provide authentication of the communicating parties. D. The protocol is based on a symmetric cryptosystem.
The correct option is C It is true that the original Diffie-Hellman key exchange protocol does not provide authentication of the sender and receiver. Other protocols such as digital signatures or HMAC must be used for this [RFC4650]. The Diffie-Hellman (DH) protocol involves computing a shared secret based on exchange of a public key (Option a), and is intended to be performed over insecure channels (Option b). DH is based on public-key cryptography because it involves deriving a shared secret based on the sender and receiver each having private keys and sharing public keys, and the property of the discrete logarithm problem, which makes it computationally infeasible to derive the private key from the public key [SCHNEIER].
221
True or false The Diffie-Hellman protocol depends on a secure communication channel for key exchange.
False, it is performed over insecure channels to set up the secure channel
222
6. What is the main security service a cryptographic hash function provides, and what is the main security property a cryptographic hash function must exhibit?
Integrity and collision resistance
223
Message authentication codes and digital signatures provide
message authenticity
224
7. What is necessary on the receiving side in order to verify a digital signature? A. The message, message digest, and the sender's private key B. The message, message digest, and the sender's public key C. The message, the MAC, and the sender's public key D. The message, the MAC, and the sender's private key
The correct option is B Verifying a digital signature is performed by decrypting the message digest using the sender's public key. Exposing the private key would mean that anyone with the private key could now forge the signature (Option a). Message authentication codes (MACs) do not use public key encryption, but produce a hash of the combined message input and a secret key (Options c and d).
225
8. What is a known plaintext attack used against DES to show that encrypting plaintext with one DES key followed by encrypting it with a second DES key is no more secure than using a single DES key? A. Meet-in-the-middle attack B. Man-in-the-middle attack C. Replay attack D. Related-key attack
The correct option is A This attack applies to double encryption schemes such as 2DES by encrypting known plaintext using each possible key and comparing results obtained "in the middle" from decrypting the corresponding ciphertext using each possible key. Option b is a network-based cryptanalytic attack involving intercepting and forwarding a modified version of a transmission between two parties. Option c is also a network-based attack involving capturing and retransmitting
226
9. What is among the most important factors in validating the cryptographic key design in a public key cryptosystem? A. Ability of a random number generator to introduce entropy during key generation B. Preimage resistance C. Confidentiality of key exchange protocol D. Crypto period
The correct option is A The purpose of randomness in the key or keystream is to make it less likely that cryptanalysts will be able to guess or deduce the key. A random number generator that does not exhibit the property of randomness or entropy in its output will produce weak keys. Option b applies to cryptographic hash functions and is known as the "one-way" property of hash functions. Because the question asks about public-key cryptosystems, Option c is less valid because public keys can be exchanged without loss of the private key. Option d applies more to the operation and management of keys, because the crypto period is the time span during which an actual key can remain valid for use.
227
A random number generator that does not exhibit the property of randomness or entropy in its output will produce
weak keys
228
10. What factor would be most important in the design of a solution that is required to provide at-rest encryption in order to protect financial data in a restricted-access file sharing server? A. Encryption algorithm used B. Cryptographic key length C. Ability to encrypt the entire storage array or file system versus ability to encrypt individual files D. Individual user access and file-level authorization controls
The correct option is D The encryption algorithm, key length, and scope of encryption provided performed in order to ensure confidentiality, and is tied to an access control mechanism because those individuals or entities who must be able to decrypt the data will need authorised access to do so.
229
11. A large bank with a more than one million customer base implements PKI to support authentication and encryption for online Internet transactions. What is the best method to validate certificates in a timely manner? A. CRL over LDAP B. CRLDP over LDAP C. OCSP over HTTP D. CRLDP over ODBC
The correct option is C Options a, b, and d are CRL-based methods that require significant network traffic between the verifying party and the LDAP or DB server where the CRL is published. It is most significant with a large base of subscribers whose certificates may point to different CRLDP and require pulling many different CRL fragments from the points of publication.
230
12. A car rental company is planning to implement wireless communication between the cars and rental support centers. Customers will be able to use these centers as concierge services, and rental centers will be able to check the car's status if necessary. PKI certificates will be used to support authentication, non-repudiation, and confidentiality of transactions. Which asymmetric cryptography is a better fit? A. RSA 1024 B. AES 256 C. RSA 4096 D. ECC 160
The correct option is D Option b refers to a symmetric algorithm that does not support non- repudiation. The algorithms in Options a and c have significantly longer keys than the algorithm in Option d, which has equivalent strength. For wireless communication, a smaller key length is an important factor.
231
When would one choose ECC over RSA 1024 or RSA 4096
When key length is a factor such as with wireless
232
Should one backup signing keys
no
233
13. A key management system of a government agency's PKI includes a backup and recovery (BR) module. PKI issues and manages separate certificates for encryption and verification. What is the right BR strategy? A. Back up all certificates and private keys B. Back up all private keys and verification certificates C. Back up decryption keys and all certificates D. Back up signing keys and all certificates
The correct option is C Options a and b assume backing up signing keys, which is wrong. Option d assumes signing keys, which is wrong, and does not include decryption keys, which is wrong, too.
234
14. A company needs to comply with FIPS 140-2 level 3, and decided to use split knowledge for managing storage encryption keys. What is the right method for storing and using the key? A. Store the key components on the encrypted media. B. Create a master key and store it on external media owned by the first security officer. C. Store key components on separate external media owned by a different security officer. D. Publish key components on an LDAP server and protect them by officers' asymmetric keys encryption.
The correct option is C Storing key components on the same media (Option a) will expose them to one administrator or officer. One officer is in possession of all components (Option b) and can recreate the whole key. Storing secret keys on intermediate storage (Option d) is not acceptable.
235
15. An agency is using symmetric AES 128 cryptography for distributing confidential data. Because of its growth and key distribution problems, the agency decided to move to asymmetric cryptography and X.509 certificates. Which of the following is the BEST strength asymmetric cryptography to match the strength of the current symmetric cryptography? A. RSA 2048 B. ECC 160 С. ЕСС 256 D. RSA 7680
The correct option is C According to NISTSP800-57, ECC 256 cryptographic strength is equivalent to AES 128. Options a and b are wrong because they are weaker than AES 128; Option d is stronger than required and comes with impractically long keys.
236
16. One very large company created a business partnership with another, much smaller company. Both companies have their own PKI in-house. Employees need to use secure messaging and secure file transfer for their business transactions. What is the BEST strategy to implement this? A. The larger company creates a PKI hierarchical branch for the smaller company, so all parties have a common root of trust. B. The larger company enrolls all employees of the smaller company and issues their certificates, so all parties have a common root of trust. C. Companies should review each other's CP and CPS, cross- certify each other, and let each other access each other's search database. D. Employ an external third-party CA and have both company's employees register and use their new certificates for secure transactions.
The correct option is C Options a, b, and d either partially or completely disregard existing PKI infrastructure and require significant expenses for restructuring PKI or hiring an outside service.
237
Is the asymmetric cryptography in EEC 256 Stronger or Weaker than than the symmetric cryptography of AES 128
They are considered equivalent
238
17. When applications of cross-certified PKI subscribers validate each other's digitally signed messages, they have to perform the following steps: A. The signature is cryptographically correct, and sender's validation certificate and sender's CA cross-certificate are valid. B. Validate CRL and ARL. C. Validate sender's encryption certificate, ARL, and CRL. D. The signature is cryptographically correct, and sender's CA certificate is valid
The correct option is A Option b is incorrect because CRL and ARL just verify revocation status without crypto and validity period validation; Option c is incorrect because signature verification requires verification certificate validation rather than encryption; Option d is incorrect because verification of signature verification certificate is missing.
239
Why might RSA 7680 be a bad choice for asymmetric cryptography
They key size is huge, ECC may be better
240
18. A company implements three-tier PKI, which will include a root CA, several sub-CAs, and a number of regional issuing CAs under each sub-CA. How should the life span of the CA's certificates be related? A. Root CA = 10 years; sub-CA = 5 years; issuing CA = 1 year B. Root CA = sub-CA = issuing CAs = 5 years C. Root CA = 1 year; sub-CA = 5 years; issuing CA = 10 years D. Root CA = 5 years; sub-CA = 10 years; issuing CA = 1 year
The correct option is A In a hierarchical PKI, the upper CA should issue certificates to the subordinate CAs with a longer life span than those subordinates issue certificates to their subordinates. Otherwise, the chain will be expiring before the intermediate CA and entity certificates expire.
241
19. Management and storage of symmetric data encryption keys most importantly must provide A. Integrity, confidentiality, and archiving for the time period from key generation through the life span of the data they protect or the duration of the crypto period, whichever is longer. B. Confidentiality for the time period from key generation through the life span of the data they protect or duration of crypto period, whichever is longer. C. Integrity, confidentiality, and archiving for the duration of the key's crypto period. D. Integrity, confidentiality, non-repudiation and archiving for the time period from key generation through the life span of the data they protect or duration of crypto period, whichever is longer.
The correct option is A Option b is incorrect because without an integrity requirement a key may be tampered with. Option c is incorrect because if an encryption key crypto period expires before the encrypted data life span, the key destruction may leave data that is never possible to decrypt. Option d is incorrect because non-repudiation is not relevant to symmetric cryptography.
242
20. Management and storage of public signature verification keys most importantly must provide A. Integrity, confidentiality, and archiving for the time period from key generation until no protected data needs to be verified. B. Integrity and archiving for the time period from key generation until no protected data needs to be verified. C. Integrity, confidentiality and archiving for the time period from key generation through the life span of the data they protect or the duration of crypto period, whichever is longer. D. Integrity and confidentiality for the time period from key generation until no protected data needs to be verified.
The correct option is B Options a, c, and d are incorrect because confidentiality is not required for public keys.