8. Cryptographic Solutions Flashcards
Symmetric
Uses Same key for encryption and decryption
Asymmetric
Uses a pair of keys for encryption and decryption
DES
Triple DES
IDEA
AES
Blowfish
Twofish
Rivest Cipher
Symmetric Algorithms
Diffie-Hellman
RSA
Elliptic Curve Cryptography
Asymmetric Algorithms
MD5
SHA Family
RIPEMD
HMAC
Hashing Algorithms
Public Key Infrastructure (PKI)
Framework managing digital keys and certificates for secure data transfer
Digital Certificates
Electronic credentials verifying entity identity for secure communications
Blockchain
Decentralized, immutable ledger ensuring data integrity and transparency
Encryption Tools
TPM
HSM
Key Management Systems
Secure Enclave
Obfuscation Methods
Steganography
Tokenization
Data Masking
3 Types of Cryptographic Attacks
Downgrade Attacks
Collision Attacks
Quantum Computing Threats
Key Escrow
Storage of cryptographic keys in a secure, third-party location
Root of Trust
Highest level of trust in certificate validation
Certificate Authority (CA)
Trusted third party that issues digital certificates
Registration Authority (RA)
Request identifying information from the user and forwards certificate request up to the CA to create a digital certificate.
Certificate Signing Request (CSR)
A block of encoded text with information about the entity requesting the certificate
Certificate Revocation List (CRL)
List of all digital certificates that the certificate authority has already revoked.
Online Certificate Status Protocol (OCSP)
Determines certificate revocation status
OCSP Stapling
Alternative to OCSP, Allows cert holder to get the OCSP record from the sever at regular intervals
Public Key Pinning
Allows an HTTPS website to resist impersonation attacks from users who are trying to present fraudulent certificates
CRYSTALS- Dilithium
FLACON
SPHINCS+
NIST selected post-quantum cryptography standards