15 D5 Flashcards

1
Q

___ is a popular 1 way hash algorithm used to create digital signatures. Produces an output of 160 bits.

A

Secure Hash Algorithm (SHA)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

___ are a particular class of hashing algorithm devised to solve the problem of detecting errors in messages transmitted through communication lines. Have small key sizes.

A

Checksums

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

CA categories:

__ __ are self-signed and can sign intermediate certifications.

A

Root certificates

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

___ algorithms use the same key to perform both encryption and decryption

A

Symmetric key algorithms

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Type of Certificates:
___ - Contains the public key of a particular CA. They can be what’s called a ‘self-signed’ certificate or signed by another CA.

A

Certificate Authority cert

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

__ supports keys from 0 to 448 and operates in block mode with a block size of 64.

A

Blowfish

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

SSL Security Features:
___ - Each record is run through a message digest such as MD5. The receiving end reverses the process using the same message using the same message digest to ensure data integrity.

A

Data Integrity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

___ supports keys from 128, 196, and 256. It operates in block mode with a block size of 128.

A

Advanced Encryption Standard (AES)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

___ algorithms use 2 keys, public and private, with mathematical relations to each other. If one encrypts, only the other can decrypt and vice versa.

A

Asymmetric key algorithms

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

___ produces either 128 bit or 256 bit hash codes. Can run with a variable number of rounds of the internal algorithms.

A

Snefru

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

___ was developed by IBM to extend the life of the original DES due to limited 56-bit key. There are 2 modes.

A

Triple Data Encryption Standard (3DES)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Digital Signatures:

___ Key - portion of the key used to sign an email. Is password protected, users should never give their keys to anyone.

A

Private Key

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

__ was designed for 32 bit computers and outputs a 128 bit hash.

A

MD5

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

3 SSH Authentication methods are:

___ ___ ___

A

.rhosts
.rhosts and RSA
Password

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

__ issue digital certificates. Are a trusted 3rd party. The widely used specification/standard is X.509.

A

Certification Authorities

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Types of Certificates:

___ - Contains individuals public keys used to verify users identity.

A

Personal cert

17
Q

3DES-__ Uses 3 different keys for an effective key strength of 168 bits; theoretically susceptible to meet-in-the-middle attack.

18
Q

___ works in a client/server fashion with a suite of encryption technologies to ensure secure communications between client and server.

A

Secure SHell (SSH)

19
Q

SSL Security Features:

___ - Using digital certificate technologies ensures client and server identity.

A

Authentication

20
Q

___ algorithms are hashing functions used to produce hash codes, which are difficult to reverse. Takes input and produces as output of 128 bit fingerprint/message digest.

A

Message Digest (MD) algorithms

21
Q

___ is a variable length 1 way hash function. Processes message in 1024 bit blocks.

22
Q

__ is an integral part of securing DoD/IC networks.

A

Encryption

23
Q

Types of Certificates:
___ - Contains public keys of individuals or vendors representing a program. Used to verify and trust downloaded programs.

A

Publisher cert

24
Q

SSH uses ___ keys to create a secret key shared between client and server.

A

Asymmetric keys

25
___ Exchange was the first practical method for establishing a shared secret over an unprotected communications channel. Not actually a method of encryption and decryption.
Diffie-Heilman Key Exchange
26
CA categories: | __ __ provide the authority to sign server, personal publisher, or other intermediate CA's.
Intermediate certificates
27
Server uses it private key to decrypt it. The session key is used by whichever cipher (___) is chosen for the data encryption.
symmetric
28
Secure Socket Layer (SSL) is a protocol that provides secure communications through the Web. Was developed by (1)__. Initiated with the (2)__ url prefix. and uses port (3)__.
1- developed by Netscape 2- prefix https 3- port 443
29
__ supports keys up to 256 and operates in block mode with a block size of 128.
Twofish
30
The ___ algorithm is a cryptosystem for public key encryption and is widely used for securing sensitive data, mainly over insecure networks. Based on multiplying 2 prime large #'s.
Rivest-Shamir-Adleman (RSA) Algorithm
31
___ provide verification of temperproof data integrity and that the document originated from the person who signed it. (non-repudiation)
Digital signatures
32
Types of Certificates: | ___ - Contains public key of a web server using SSL , used to ID a particular web server
Server cert
33
3DES-__ Uses 2 of the same keys for encryption and one key for decryption. The decryption key does not truly decrypt the message to plain text.
3DES-EDE
34
SSL Security Features: | ___ - Data is compressed and encrypted with stream and block encryption cipher.
Privacy/ Confidentiality
35
Digital Signatures: | ___ Key - portion of the key that is available to other people.
Public Key
36
SSH ___ stages ensure client is authorized to connect to the server. 3 possible methods.
authentication