7.2 Cryptography Implementations Flashcards

1
Q

Hybrid cryptosystem

A

A hybrid cryptosystem combines the efficiency of symmetric encryption with the convenience of asymmetric encryption.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Digital signature

A

A digital signature is a combination of asymmetric encryption and hashing values. A signature provides confidentiality, integrity validation, strong authentication, and non-repudiation.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Hashing

A

The process of using an algorithm to convert data to a fixed-length key called a hash.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Trusted Platform Module

A

TPM is a hardware chip on the motherboard that can generate and store cryptographic keys.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Hardware security module
(HSM)

A

A hardware security module (HSM) is a piece of hardware and associated software/firmware that is connected to a computer system to provide cryptographic functions.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

How can cryptography support the goals of information security?

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Why is reusing encryption keys considered a weakness?

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is a digital signature? What benefits does it provide?

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What are the three main hashing algorithms in use today?

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What functionality does a Trusted Platform Module (TPM) chip provide?

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly