1.3 Flashcards

1
Q

what is key mgmt about?

A

generating, verrification, exchange, storage and destruction of keys

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

basic components of key mgmt are:

A

automated and random keygens, key strength verification, encrypted key storage, secure key exchange, short lifetimes, revoking and destroying keys that have expired or are compromised

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

describe hash algorithm

A

hash will take info, run math on it and produce a string called a digest

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

what is hash vulnerable to?

A

it is vulnerable to MITM and has no security with transmitted data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

what do you have to use that you have security with transmitted data?

A

HMAC

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

examples for HMAC

A

md5, sha-2

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

what is the full name for hmac?

A

hashed message authentication code

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

how is hmac built?

A

hash + a key that is only known by both parties

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

what does the hash algorithm in general secure? CIA

A

integrity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

what does encryption secure? CIA

A

confidentiality

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

how many keys does a symmetrical encryption use?

A

one key to encrypt and decrypt

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

examples for symmetrical encryption?

A

3des and aes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

what has to be done before any encryption happens?

A

a secure channel needs to be created before any encryption happens for the key mgmt

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

for what data encryption is a symmetrical encryption useful?

A

it is useful for bulk data encryption

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

how many keys does the asymmetrical encryption use?

A

a pair of keys to encrypt and decrypt

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

is the asymmetrical encryption faster or slower than the symmetrical?

A

slower

17
Q

of what keys consists the asymmetrical encryption?

A

of a public and a private key

18
Q

examples for asymmetrical encryption

A

rsa, dh

19
Q

which application use the asymmetrical encryption?

A

ssh, ike and ssl

20
Q

what three basic security services are digital signatures providing?

A

it authenticates a source proving that a certain party has seen and signed the data in questions, guarantees that the data has not changed from the time it was signed, proves to a third party that the data exchange did take place

21
Q

which functionality are digital signatures providing?

A

the same as handwritten signatures

22
Q

where are digital signatures commonly used? and why?

A

in code signing to verify the integrity (Vollständigkeit) of downloaded files and in digital certificates to verify the identity of an organization or individual

23
Q

what are the basic four properties of digital signatures?

A

the signatures is authentic (echt), the signature is not forgeable (schmiedbar), the signature is not reusable (wiederverwendbar) and the signer cannot claim later that they did not sign it

24
Q

what are digital certificates used for?

A

to authenticate and verify that a user sending a message is who they claim to be

25
Q

for what is RSA commonly used?

A

it is commonly used for generating and verifying digital signatures

26
Q

which framework is used to secure exchange info between parties?

A

PKI (public key infrastructure)

27
Q

how to authenticate with asymmetric encyrption

A

the one who sends does it encrypt with the private key and they other one decrypts it with the public key of the one who sent it

28
Q

for what is CA (certificate authority)used for?

A

it plays the role of the trusted third party and issues certs that show the identity of companies and users, which are used to sign messages to ensure no tampering

29
Q

the different topologies for PKIs

A

single root, hierarchical and cross certified