1.3 Flashcards
what is key mgmt about?
generating, verrification, exchange, storage and destruction of keys
basic components of key mgmt are:
automated and random keygens, key strength verification, encrypted key storage, secure key exchange, short lifetimes, revoking and destroying keys that have expired or are compromised
describe hash algorithm
hash will take info, run math on it and produce a string called a digest
what is hash vulnerable to?
it is vulnerable to MITM and has no security with transmitted data
what do you have to use that you have security with transmitted data?
HMAC
examples for HMAC
md5, sha-2
what is the full name for hmac?
hashed message authentication code
how is hmac built?
hash + a key that is only known by both parties
what does the hash algorithm in general secure? CIA
integrity
what does encryption secure? CIA
confidentiality
how many keys does a symmetrical encryption use?
one key to encrypt and decrypt
examples for symmetrical encryption?
3des and aes
what has to be done before any encryption happens?
a secure channel needs to be created before any encryption happens for the key mgmt
for what data encryption is a symmetrical encryption useful?
it is useful for bulk data encryption
how many keys does the asymmetrical encryption use?
a pair of keys to encrypt and decrypt