15 D5 Flashcards
___ is a popular 1 way hash algorithm used to create digital signatures. Produces an output of 160 bits.
Secure Hash Algorithm (SHA)
___ are a particular class of hashing algorithm devised to solve the problem of detecting errors in messages transmitted through communication lines. Have small key sizes.
Checksums
CA categories:
__ __ are self-signed and can sign intermediate certifications.
Root certificates
___ algorithms use the same key to perform both encryption and decryption
Symmetric key algorithms
Type of Certificates:
___ - Contains the public key of a particular CA. They can be what’s called a ‘self-signed’ certificate or signed by another CA.
Certificate Authority cert
__ supports keys from 0 to 448 and operates in block mode with a block size of 64.
Blowfish
SSL Security Features:
___ - Each record is run through a message digest such as MD5. The receiving end reverses the process using the same message using the same message digest to ensure data integrity.
Data Integrity
___ supports keys from 128, 196, and 256. It operates in block mode with a block size of 128.
Advanced Encryption Standard (AES)
___ algorithms use 2 keys, public and private, with mathematical relations to each other. If one encrypts, only the other can decrypt and vice versa.
Asymmetric key algorithms
___ produces either 128 bit or 256 bit hash codes. Can run with a variable number of rounds of the internal algorithms.
Snefru
___ was developed by IBM to extend the life of the original DES due to limited 56-bit key. There are 2 modes.
Triple Data Encryption Standard (3DES)
Digital Signatures:
___ Key - portion of the key used to sign an email. Is password protected, users should never give their keys to anyone.
Private Key
__ was designed for 32 bit computers and outputs a 128 bit hash.
MD5
3 SSH Authentication methods are:
___ ___ ___
.rhosts
.rhosts and RSA
Password
__ issue digital certificates. Are a trusted 3rd party. The widely used specification/standard is X.509.
Certification Authorities
Types of Certificates:
___ - Contains individuals public keys used to verify users identity.
Personal cert
3DES-__ Uses 3 different keys for an effective key strength of 168 bits; theoretically susceptible to meet-in-the-middle attack.
3DES-EEE
___ works in a client/server fashion with a suite of encryption technologies to ensure secure communications between client and server.
Secure SHell (SSH)
SSL Security Features:
___ - Using digital certificate technologies ensures client and server identity.
Authentication
___ algorithms are hashing functions used to produce hash codes, which are difficult to reverse. Takes input and produces as output of 128 bit fingerprint/message digest.
Message Digest (MD) algorithms
___ is a variable length 1 way hash function. Processes message in 1024 bit blocks.
Haval
__ is an integral part of securing DoD/IC networks.
Encryption
Types of Certificates:
___ - Contains public keys of individuals or vendors representing a program. Used to verify and trust downloaded programs.
Publisher cert
SSH uses ___ keys to create a secret key shared between client and server.
Asymmetric keys