SSL/TLS Flashcards

1
Q

What does TLS stand for?

A

Transport Layer Security

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is the purpose of TLS protocols?

A

to provide a secure channel between two entities (e.g. a client web browser and a web server) over a public channel

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What security services does TLS provide? (4)

A
  1. confidentiality
  2. data integrity
  3. data origin authentication
  4. entity authentication.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

How are the cryptographic primitives used in TLS? (4)

A
  1. Public-key cryptography is used to enable symmetric key establishment
  2. Digital signatures are used to sign certificates and facilitate entity authentication
  3. Symmetric encryption is used to provide confidentiality
  4. MACs are used to provide data origin authentication
    and facilitate entity authentication
  5. Hash functions are used as components of MACs and digital signatures, and for key derivation.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What information is included in the cipher suite? (4)

A
  1. Key exchange algorithm
  2. Authentication algorithm
  3. Encryption algorithm
  4. Hash algorithm
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What two parts does TLS consist of?

A

Handshake protocol & record protocol

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is the purpose of the handshake protocol?

A

to perform all the tasks requiring agreement between the two entities before they set up the secure TLS channel

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is the purpose of the record protocol?

A

to implement the secure channel for communication

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

How many keys are required to be derived from the master key for both encryption and MACs?

A

4 (two each)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Why are the random numbers needed for key generation?

A

So that new keys are established each session

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

At what stage of the TLS handshake protocol are the cryptographic algorithms agreed upon?

A

At the end of the second protocol message (server response)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Does the simple TLS handshake protocol provide MUTUAL entity authentication?

A

no, only entity authentication of the server via the ‘server finished’ messages

How well did you know this?
1
Not at all
2
3
4
5
Perfectly