5 Security Operations Flashcards
an encryption algorithm is a
complex mathematical formula
an encryption key is the
password
The decryption algorithm and decryption key
reverse the process
Protecting data at rest (stored) - 3 main areas
1 file encryption
2 disk encryption
3 device encryption
Protecting data in transit (moving over a network) - 4 main areas
1 HTTPS
2 email
3 mobile applications
4 VPN
2 main categories of encryption algorithms
symmetric and asymmetric
Symmetric Encryption uses
- AES (Advanced Encryption Standard) algorithm
- encrypt and decrypt with the same (shared) key
Asymmetric Encryption uses
- RSA (Rivest-Shamir-Adleman) algorithm
- asymmetric algorithms use different keys for encryption and decryption (must be from the same pair)
Hash Functions (Message Digests) are
- one-way functions that transform a variable-length input into a unique, fixed-length output
Common Hash Functions (6)
1 MD5 (Message Digest 5)
2 SHA 1 (Secure Hash Algorithm)
3 SHA 2
4 SHA 3
5 RIPEMD (Race Integrity Primitives Evaluation Message Digest)
6 HMAC (Hash-based Message Authentication Code)
SHA 1
- 160-bit hash value
- no longer secure
SHA 2
- produce different lengths (including 224, 256, 384, and 512 bit)
- some vulnerabilities but still widely used
SHA 3
- uses Keccak algorithm to produce a hash of any desired length
- length is set by the person computing the hash, so is still fixed length
RIPEMD
- alternative to SHA (due to trust issues with the US gov - SHA)
- 4 variants - 128 (no longer secure), 160 (widely used - bit coin transactions), 256, and 320 bit)
HMAC
- combines symmetric cryptography with hashes to provide authentication and integrity for messages (protects against packet loss/tampering)
- sender uses a secret key (shared) a hash function (agreed upon)