15 D5 Flashcards
___ is a popular 1 way hash algorithm used to create digital signatures. Produces an output of 160 bits.
Secure Hash Algorithm (SHA)
___ are a particular class of hashing algorithm devised to solve the problem of detecting errors in messages transmitted through communication lines. Have small key sizes.
Checksums
CA categories:
__ __ are self-signed and can sign intermediate certifications.
Root certificates
___ algorithms use the same key to perform both encryption and decryption
Symmetric key algorithms
Type of Certificates:
___ - Contains the public key of a particular CA. They can be what’s called a ‘self-signed’ certificate or signed by another CA.
Certificate Authority cert
__ supports keys from 0 to 448 and operates in block mode with a block size of 64.
Blowfish
SSL Security Features:
___ - Each record is run through a message digest such as MD5. The receiving end reverses the process using the same message using the same message digest to ensure data integrity.
Data Integrity
___ supports keys from 128, 196, and 256. It operates in block mode with a block size of 128.
Advanced Encryption Standard (AES)
___ algorithms use 2 keys, public and private, with mathematical relations to each other. If one encrypts, only the other can decrypt and vice versa.
Asymmetric key algorithms
___ produces either 128 bit or 256 bit hash codes. Can run with a variable number of rounds of the internal algorithms.
Snefru
___ was developed by IBM to extend the life of the original DES due to limited 56-bit key. There are 2 modes.
Triple Data Encryption Standard (3DES)
Digital Signatures:
___ Key - portion of the key used to sign an email. Is password protected, users should never give their keys to anyone.
Private Key
__ was designed for 32 bit computers and outputs a 128 bit hash.
MD5
3 SSH Authentication methods are:
___ ___ ___
.rhosts
.rhosts and RSA
Password
__ issue digital certificates. Are a trusted 3rd party. The widely used specification/standard is X.509.
Certification Authorities