6.0 Cryptography and PKI Flashcards

1
Q

Any cryptographic algorithm that uses the same key to encrypt and decrypt.
Ex: AES, DES, 3DES, RC4, Blowfish, and Twofish

A

Symmetric Algorithm

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Cryptographic algorithms that use two different keys—one key to encrypt and another to decrypt. Also called public key cryptography.
Ex: RSA, DSA, Diffie-Hellman,

A

Asymmetric Algorithm

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

A number created by executing a hashing algorithm against data, such as a file or a message.
It is commonly used for Integrity.
Ex:MD5, SHA-1, and HMAC

A

Hash

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Bits added to a hash to make it resistant to rainbow table attacks.

A

Salt

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

The Process used to exchange keys between users who receive it. Keys can be exchanged in-band and out-of-band.

A

Key Exchange

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

An encrypted hash of a message, encrypted with the senders private key. It provides authentication, non-repudiation, and integrity.

A

Digital Signature

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

A cryptography concept that ensures small changes in plaintext result in significant changes in ciphertext.

A

Diffusion

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

A cryptography concept that indicates ciphertext is significantly different than plaintext.

A

Confusion

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

When two different inputs into a cryptographic hash produce the same output, this is known as a collision.

A

Collision

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

The practice of hiding data within data.

A

Steganography

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

An attempt to make something unclear or difficult to understand. Steganography methods use this to hide data within data.

A

Obfuscation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

An encryption method that encrypts data as a stream of bits or bytes.

A

Stream Cipher

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Encryption method that encrypts data in fixed-size blocks.

A

Block Cipher

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

A key that is generated for one immediate use only, and is never used again.

A

Ephemeral Key

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Any data sent over a network. It is common to encrypt this.

A

Data-in-Transit

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Any data stored on media. It is common to encrypt this.

A

Data-at-Rest

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Any data currently being used by a computer. Because the computer needs to process the data, it is not encrypted while in use.

A

Data-in-use

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

A technique used to increase the strength of stored passwords. Its additional bits and can help thwart brute force and rainbow table attacks.

A

Key Stretching

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

A strong symmetric block cipher that encrypts data in 128-bit blocks. Can also use 128-bits, 192-bits, or 256-bits.

A

AES

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

A strong symmetric block cipher that encrypts data in 128-bit blocks. Can also use 128-bits, 192-bits, or 256-bits.

A

AES (Advanced Encryption Standard)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

A legacy symmetric encryption standard used to provide confidentiality. It has been compromised and AES or 3DES should be used instead.

A

DES (Data Encryption Standard)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

A Symmetric algorithm used to encrypt data and provide confidentiality. It is a block cipher that encrypts data in 64-bit blocks.

A

3DES

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

A symmetric stream cipher that can use between 40 and 2048 bits. Experts consider it cracked and recommend using stronger methods.

A

RC4 (Rivest Cipher 4)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

A symmetric key block cipher. It encrypts data in 128-bit blocks and supports 128-, 192-, or 256- bit keys.

A

Twofish

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

A mode of operation used for encryption that effectively converts a block cipher into a stream cipher. It uses an IV for the first block and each subsequent block is combined with this previous block.

A

CBC (Cipher Block Chaining)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

A mode of operation used for encryption. It combines the Counter (CTM) Mode with hashing techniques for data authenticity and confidentiality.

A

GCM

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

A mode of operation used for encryption. It combines the Counter (CTM) Mode with hashing techniques for data authenticity and confidentiality.

A

GCM (Galois/Counter Mode)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

A legacy mode of operation used for encryption. It is weak and should not be used.

A

ECB (Electronic Codebook)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

A mode of operation for encryption that combines an IV with a counter. The combined result is used to encrypt blocks.

A

CTM (Counter Mode)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q

An asymmetric algorithm used to encrypt data and digitally sign transmissions. It is named after its creators.

A

RSA (Rivest, Shamir, Adleman)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
31
Q

An encrypted hash of a message used for authentication, non-repudiation, and integrity. The sender’s private key encrypts the hash of the message.

A

DSA (Digital Signature Algorithm)

32
Q

Uses Ephemeral Keys, which are re-created for each session.

A

DHE

33
Q

Uses Elliptic Curve Cryptography to generate encryption keys.

A

ECDHE

34
Q

Assymetric algorithm based upon mathematical problems involving the algebraic structure of elliptic curves over finite fields; suitable for use in small mobile devices because of the low computing power requirements.

A

ECC

35
Q

Assymetric algorithm based upon mathematical problems involving the algebraic structure of elliptic curves over finite fields; suitable for use in small mobile devices because of the low computing power requirements.

A

ECC (Elliptic Curve Cryptography)

36
Q

Cryptography application and protocol suite used in asymmetric cryptography. It is proprietary, but it also has an open source.

A

PGP (pretty good privacy)

37
Q

Hashing algorithm used to compute fixed-length message digests of variable-length pieces of text, developed by Rin Rivest. It generates a 128-bit hash that is 32 hexadecimal characters long. Although this is still widely used, it has depreciated due to the potential for collisions, and is currently considered unsuitable for modern hashing algorithms.

A

MD5 (message digest 5)

38
Q

A series of hashing algorithms developed by NIST and the NSA which include ___-1, ____-2, and most recently ____-3 based on the Keccak hash function.

A

SHA (secure hashing algorithm)

39
Q

System used in conjunction with a hashing algorithm and symmetric key in order to both authenticate and verify the integrity of a message.

A

HMAC (High-Based Message Authentication Mode)

40
Q

A hash function used for integrity. It creates a fixed length hashe of 128, 160, 258, or 320 bits.

A

RIPEMD (RACE Integrity Primitives Evaluation Message Digest)

41
Q

A substitution cipher that uses a key of 13. to encrypt a message you would rotate each letter 13 spaces. To decrypt the message you would rotate each letter 13 spaces.

A

ROT13

42
Q

A wireless security protocol. It has been superseded by WPA2

A

WPA

43
Q

A wireless security protocol. It supports CCMP for encryption which is based on AES. It can use open mode, a pre-shared key, or enterprise mode.

A

WPA2

44
Q

A wireless security protocol. It has been superseded by WPA2

A

WPA (Wi-fi Protected Access)

45
Q

A wireless security protocol. It supports CCMP for encryption which is based on AES. It can use open mode, a pre-shared key, or enterprise mode.

A

WPA2 Wi-Fi protected access 2)

46
Q

An authentication framework that provides general guidance for authentication methods.

A

EAP

47
Q

A Cisco designed replacement for lightweight EAP. It supports certificates, but they are optional.

A

EAP-FAST

48
Q

An authentication framework that provides general guidance for authentication methods.

A

EAP (Extensible Authentication Protocol)

49
Q

A Cisco designed replacement for lightweight EAP. It supports certificates, but they are optional.

A

EAP-FAST (Extensible Authentication Protocol via secure Tunneling)

50
Q

An extension of EAP sometimes used with 802.1x. This is one of the most secure EAP standards and is widely implemented. It requires certificates on the 802.1x server on clients.

A

EAP-TLS (Extensible Authentication Protocol- Transport Layer Security)

51
Q

AN extension of EAP sometimes used with 802.1x It allows systems to use some older authentication methods such as PAP within a TLS tunnel. It requires a certificate on the 802.1x server but not on the clients.

A

EAP-TTLS (Extensible Authentication Protocol- Tunneled Transport Layer Security)

52
Q

A wireless mode that uses pre-shared keys for security.

A

PSK

53
Q

A wireless mode that uses an 802.1x server for security. It forces users to authenticate with a username and a password.

A

Enterprise Mode

54
Q

An authentication process that requires the user to do something in order to complete the enrollment process. Examples include pressing a button on the router within a short time period, entering a PIN, or bringing the new device close.

A

WPS (Wi-Fi Protected Setup)

55
Q

An organization that manages , issues and signs certificates. They are a main element of PKI.

A

CA

56
Q

A list of certificates that a CA has revoked. Certificates are commonly revokes if they are compromised, or issued to an employee who has left the organization.

A

CRL

57
Q

An alternative to using a CRL. It allows entities to query a CA with the serial number of a certificate. The CA answers with Good, revoked, or unknown.

A

OCSP

58
Q

An organization that manages , issues and signs certificates. They are a main element of PKI.

A

CA (Certificate Authority)

59
Q

A list of certificates that a CA has revoked. Certificates are commonly revokes if they are compromised, or issued to an employee who has left the organization.

A

CRL Certificate Revocation List

60
Q

An alternative to using a CRL. It allows entities to query a CA with the serial number of a certificate. The CA answers with Good, revoked, or unknown.

A

OCSP Online Certificate Status Protocol

61
Q

A method of requesting a certificate from a CA. It starts by creating an RSA-based public/private key pair then includes the public key in this.

A

CSR

62
Q

A security mechanism used by some web sites to prevent web site impersonation. Websites provide clients with a list of public key hashes. Clients store the list and use it to validate the website.

A

Pinning

63
Q

The process of appending a digitally signed OCSP response to a certificate. It reduces the overall OCSP traffic sent to a CA.

A

Stapling

64
Q

The process of placing a copy of a private key in a safe environment.

A

Key Escrow

65
Q

A certificate that combines all certificates within the trust model. It includes all of the certificates in the trust chain from the root CA down to the certificate issued to the end user.

A

Certificate Chaining

66
Q

A certificate that can be used for multiple domains with the same root domain. It starts with an asterisk.

A

Wildcard

67
Q

A server that can take a pool of hard disks and present them over the network as any number of logical disks.

A

SAN

68
Q

The process of assigning a certificate to code. The certificate includes a digital signature and validates the code.

A

Code signing

69
Q

A popular standard used to secure emails. This provides confidentiality, integrity, authentication, and non-repudiation.

A

S/MIME

70
Q

A server that can take a pool of hard disks and present them over the network as any number of logical disks.

A

SAN (Storage Area Network)

71
Q

A base format for PKI certificates. They are BASE64 ASCII encoded files.

A

DER

72
Q

Binary encoded files that is a base format for PKI certificates.

A

CER

73
Q

A common format for PKI certificates. It can either be CER (SDCII) or DER (binary) formats and can be used for almost any type of certificate.

A

PEM

74
Q

A common format for PKI certificates. It is the predecessor to P12 Certificates.

A

PFX

75
Q

A common format for PKI certificates. They are CER based (binary) and often hold certificates with the private key. They are commonly encrypted.

A

P12

76
Q

A common format for PKI certificates. They are DER-based (ASCII) and commonly used to share public keys.

A

P7B