3 - 4: Key Management Flashcards

1
Q

Out-of-band key exchange

A

Exchanging keys (within a symmetric system) in a mutually trusted way

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

The Diffie-Hellman key exchange

A

In-band key exchange for symmetric key systems (great visual example @1:42)

1) Start with two numbers, one is prime. 2) Choose a secret number 3) calculate secret number = non-prime number to the secret number mod prime number 4) send the resulting number 5) the other party does the same calculation but with a different secret number 6) calculate the shared number

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Key Escrow

A

Holding keys for law enforcement to use in the event of a crime

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Clipper chip

A

A proposed 1993 solution providing a Law Enforcement Field, allowing the government computer access if necessary, however it was discovered to have flaws

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Recovery agents

A

A master key that can decrypt any encrypted data in an organization

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Key stretching

A

Take a password and use math to make it harder to crack using 1) a salt value and 2) hashing the resulting value

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Password-based Key Derivation Function v2

A

Uses salting and hashing to stretch a key. Should use at least 4,000 times

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

bCrypt

A

Key stretching using the blowfish algorithm

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Hardware Security Modules

A

Special hardware designed to manage encryption keys and perform cryptographic operations.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

FIPS 140-2

A

Government guidelines on HSMs.

Sec level 1: Standard operating systems, no physical security
Sec level 2: EAL2 software and firmware, tamper-evident seals
Sec level 3: EAL3 software and firmware, tamper-resistant controls
Sec level 4: EAL4 software and firmware, strict physical security

How well did you know this?
1
Not at all
2
3
4
5
Perfectly