3.4: Cryptosystems Flashcards

1
Q

On what is a private key cryptosystem based?

A

On a symmetric cryptographic algorithm.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

The primary characteristic of a private key cryptosystem

A

The necessity for both parties to possess a common encryption key that is used to encrypt and decrypt messages.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

The main challenge with the private key cryptographic

A
  • Key exchange - which must occur over a secure channel. The exchange o the encrypted key mush happens before the message is transmitted
  • Scalability - Private key cryptosystems require that each sender-receiver pair exchange an encryption key.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Secure key exchange

A

Secure key exchange refers to methods used by two parties to securely establish a symmetric encryption key without actually transmitting the key over a channel.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

On what is a public key cryptosystem based?

A

Public key cryptosystems are based on asymmetric, or public key, cryptographic algorithms.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

The encryption keys used in public key cryptography

A

The encryption keys that are used in public key cryptography are called the public key and the private key; called key pair.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

symmetric encryption keys vs asymmetric encryption keys

A

• For symmetric - User must first establish and communicate symmetric encryption keys through a secure channel. After that, the same key is used for encryption and decryption

  • For asymmetric encryption - No need to establish a secure channel to exchange key. Encryption uses one key, and decryption uses another key.
  • Public key cryptography also supports encryption of a message with more than one user’s public key.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Handling of keys in asymmetric encryption keys

A

A public key can be shared or posted online

A private key is not shared. It should be kept secret.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What can Public key cryptography achieve

A
  • To protect the confidentiality of the message
  • To verify the integrity and authenticity of the message

Public key cryptography can be used to both encrypt and digitally sign a message, which will guarantee its confidentiality as well as its authenticity.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Vulnerabilities of public keys

A

It is possible for a fraudster to claim the identity of another person and even publish a public key that claims the identity of that person.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Method for verifying a public key

A
  • Certificate authority
  • E-mail address - user’s email address
  • Directory infrastructure - Microsoft Active Directory
  • Key fingerprint
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Hashing

A

Hashing is the process of applying a cryptographic algorithm on a block of information that results in a compact, fixed-length “digest.”

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Purpose of hashing

A

The purpose of hashing is to provide a unique “fingerprint” for the message or file—even if the file is very large.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

A message digest

A

A message digest, called has is a fixed size numeric representation of the contents of a message, computed by a hash function. A message digest can be encrypted, forming a digital signature.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Digital Signatures

A

A digital signature is a cryptographic operation where a sender “seals” a message or file using his identity.

A digital signature is using asymmetric cryptography, in reverse order.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

The purpose of a digital signature

A

The purpose of a digital signature is to authenticate a message and to guarantee its integrity.

17
Q

Symmetric and asymmetric cryptography

A

Symmetric cryptography - Private Key

Asymmetric cryptography - Public key

18
Q

A digital envelope

A

A secure electronic data container that is used to protect a message through encryption and data authentication.

19
Q

How a digital envelope works

A

A digital envelope uses two layers for encryption: Secret (symmetric) key and public key encryption. Secret key encryption is used for message encoding and decoding. Public key encryption is used to send a secret key to a receiving party over a network

20
Q

How to decrypt a digital envelope

A

A digital envelope may be decrypted by using a receiver’s private key to decrypt a secret key, or by using a secret key to decrypt encrypted data

21
Q

Public key infrastructure (PKI)

A

Public key infrastructure (PKI) distributes digital certificates.
A PKI is a centralized function that is used to store and publish public keys and other information.

22
Q

Certificate authority (CA)

A

A CA is a business entity that issues digital certificates and publishes them in the PKI.

The primary role of the CA is to digitally sign and publish the public key bound to a given user.

A public key that has been obtained from a trusted, reputable certificate authority can be considered genuine.

23
Q

Registration authority

A

Take the burden off of a CA by handling verification when a request for a new digital certificate is made.

24
Q

Certificate Revocation List

A

A CRL is an electronic list of digital certificates that have been revoked prior to their expiration date.

25
Q

Certification Pratice Statement

A

This is a published statement that describes the practices used by the CA to issue and manage digital certificates. This helps determine the relative strength and validity of digital certificates that are issued by the CA.

26
Q

X.509

A

International standard for the format and information contained in a digital certificate.
X.509 is the most used type of digital certificate in the world.

27
Q

Encryption Key Management

A
  • Key generation

* Key Protection

28
Q

What is a Key compromise

A

A key compromise is any event where a private encryption key has been disclosed to any unauthorized third party.

29
Q

Key encrypting Keys

A

Use of encryption to protect the encryption key.

30
Q

Key Custody

A

refers to the policies, processes, and procedures regarding the management of keys.

31
Q

Key rotation

A

Key rotation is the process of issuing a new encryption key and re-encrypting data protected with the new key.

32
Q

When can key rotation occur?

A
  • If Key is comprmised
  • If key is expired
  • in case of rotation of staff
33
Q

Encryption application - SSL/TLS

A

The encryption protocols used to encrypt web pages requested with HTTPS protocol.

SSL/TLS uses public key encryption, private key encryption, and hash function.

34
Q

Weaknesses of SSL/TLC

A

All versions of SSL and the early version of TLS are now considered deprecated, and should no longer be used.

35
Q

Encryption application: S-HTTP

A

S-HTTP also provides encryption of web pages between web servers and web browsers.

The main difference between HTTPS and S-HTTP is that HTTPS secures the entire channel, regardless of the data that is transmitted through it. S-HTTP protects only individual pieces of data or messages.

36
Q

Secure Shell (SSH)

A

Secure Shell is a multipurpose protocol that is used to create a secure channel between two systems.

37
Q

Internet Protocol Security (IPsec)

A

IPsec is a protocol used to create a secure, authenticated channel between two systems. IPsec operates at the Internet layer in the TCP/IP protocol suite;

38
Q

Secure Multipurpose Internet Mail Extensions (S/MIME)

A

S/MIME is an e-mail security protocol that provides sender and recipient authentication and encryption of message content and attachments. S/MIME is most often used for encryption of e-mail messages.