ch 4 Flashcards
define key strength
primary characteristics that determine the resiliency of the key to attacks, randomness, length of key, crypto period.
what are the different block cypher modes
(ECB) Electronic code book
(CBC) cipher block chaining
(CTR) Counter
(GCM) Galois/counter
Block cypher mode that each possible block of plaintext has a defined corresponding ciphertext value and vise versa
(ECB) electronic code book
block cipher mode in which a sequence of bits are encrypted as a single unit or blocked with a cipher key applied to the entire block.
(CBC)cipher block chaining
block cipher mode in which value that is encrypted and given as input to XOR with plaintext which results in cyphertext block
(CTR) Counter
Symmetric key that provides both privacy and integrity encryption
(GCM) Galois/ Counter
Generates keys, provides key storage’s implements cryptographic algorithms. can be implemented in software or hardware
Crypto service provider
a value that can be used to ensure that plaintext when hashed, will not consistently result in the same digest.
salt
input value that must be unique with some specified scope
Nonce
arbitrary number that can be used along with a secret key for data encryption
(IV) Initializing Vector
used to prove a document originated from a valid sender. they only show the private key of the sender was used to encrypt the digital sender.
digital certificates
used to help solve the problem of verifying identity
trusted third party
associated a users identity to a public key
digital certificate
responsible for digital certificates
(CA) Certificate authority
also known as a (CSR) Certificate signing request.
digital certificate
what is the process for the CSR
user signs the CSR then sends it to the intermediate CA, intermediate CA verifies the CSR and authenticity. intermediate CA’s process the certificates request, verifies the identity of the individual.
what do you do to ensure the integrity of a Root CA (the beginning stage of a certificate)
keep it offline from the network
publicly accessible centralized directory of digital certificates can be managed locally by a storage are connected to the CA server
(CR) Certificate Repository
cert is no longer in use details have changed and the private key lost or stolen cert has been revoked
certificate revocation
cert serial numbers that have been revoked
(CRL) certification revocation list
performs real time lookup of the certificate status, called a request response protocol
(OCSP) Online certificate status protocol
OCSP where web servers send queries to the OCSP responder server at regular intervals to receive a signal time stamped response.
OCSP stapling
what are the common digital certs
Root cert, domain certs, hardware and software certs
the process of verifying a digital certificate
certificate chaining
endpoint of the chain of certificate chaining
user digital certificate
the beginning of the chain of certificate chaining
root digital certificate