Ch 4 Key Terms Flashcards

1
Q

three primary characteristics: randomness, length of key, cryptoperiod (length of time for which a key is authorized for use)

key strength
initialization vector (IV)
salt
Counter (CTR)

A

Key Strength

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

after being encrypted, each ciphertext blocks gets “fed back” into the encryption process to encrypt the next plaintext block

Electronic Code Book (ECB)
nonce
Counter (CTR)
Cipher Block Chaining (CBC)

A

Cipher Block Chaining (CBC)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

requires that both the message sender and receiver access a counter, which computes a new value each time a ciphertext block is exchanged

Galois/Counter (GCM)
nonce
initialization vector (IV)
Counter (CTR)

A

Counter (CTR)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

most widely used algorithm input; random and unpredictable, or at least unique for each message encrypted with a given key

digital certificate
nonce
initialization vector (IV)
salt

A

initialization vector (IV)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

a value that can be used to ensure that plaintext, when hashed, will not consistently result in the same digest; prevents an attacker from generating digests of commonly used passwords or dictionary words that can be compared to the digest of a stolen password.

encryption
initialization vector (IV)
nonce
salt

A

salt

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

if a user wants a digital certificate he must, after generating the public and private keys to be used, complete a request with information such as name, address, email address

online CA
certificate authority (CA)
intermedicate certificate
certificate signing request (CSR)

A

certificate signing request (CSR)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

responsible for digital certificates

certificate authentication authority (CA)
intermedicate certificate
Certificate Revocation List (CRL)
certificate authority (CA)

A

certificate authority (CA)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

a list of certificate serial numbers that have been revoked

offline CA
Certificate Revocation List (CRL)
OCSP stapling
OCSP Responder

A

Certificate Revocation List (CRL)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

performs a real-time lookup of a certificate’s status; aka a request-response protocol

OCSP Responder
OCSP stapling
certificate chaining
Online Certificate Status Protocol (OCSP)

A

Online Certificate Status Protocol (OCSP)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

provides immediate revocation information on that one specific certificate

OCSP Responder
pinning
OCSP stapling
certificate chaining

A

OCSP Responder

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

the endpoint of the certificate chaining

user certificate
self-signed
user digital certificate
root digital certificate

A

user digital certificate

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

created by the master secret; symmetric keys to encrypt and decrypt information exchanged during the session and to verify its integrity

session keys
Key exchange
handshake
web server digital certificates

A

session keys

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

ensure the authenticity of the web server to the client; ensure the authenticity of the cryptographic connection to the web server

web server digital certificates
email digital certificate
handshake
Key exchange

A

web server digital certificates

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

web servers can set up secure cryptographic connections so that all transmitted data is encrypted by providing the server’s public key with a digital certificate to the client.

extended validation (EV)
Key exchange
handshake
domain validation digital certificate
A

Key exchange

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

enhanced type of domain digital certificate; required more extensive verification of the legitimacy of a business; when a web browser indicates to users that they are connected to a website that uses higher-level EV, a green padlock along with the site’s name is displayed

domain validation digital certificate
machine digital certificate
code signing digital certificate
extended validation (EV)

A

extended validation (EV)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

verifies the identity of the entity that has control over the domain name; displays a green padlock icon in the web browser

email digital certificate
domain validation digital certificate
extended validation (EV)
machine digital certificate

A

domain validation digital certificate

17
Q

was created to satisfy the requirements of the X.509 specification for secure data transfer

PKCS#12
Privacy enhancement mail (PEM)
canonical encoding rules (CER)
distinguished encoding rules (DER)

A

distinguished encoding rules (DER)

18
Q

follow ITU-T X.690

tunnel mode
PKI (Public Key Infrastructure)
X.509 certificates
email digital certificate

A

X.509 certificates

19
Q

PEM, PFX and PKCS#12

x.609 file formats
Hierarchical Trust Model
x.509 file formats
bridge trust model

A

x.509 file formats

20
Q

a consistent means to manage digital certificates; the underlying infrastructure for the management of public keys used in digital certificates

PKI (Public Key Infrastructure)
Key exchange
key escrow
Secure key escrow

A

PKI (Public Key Infrastructure)

21
Q

refers to a process in which keys are managed by a third party such as a trusted CA; the private key is split and each half is encrypted; the two halves are registered and sent to the third party which store each half in a separate location

cerfificate life cycle
key escrow
Secure key escrow
key recovery agent

A

key escrow

22
Q

a highly trusted person responsible for recovering lost or damaged digital certificates

key escrow
key recovery agent
cipher suite
Secure key escrow

A

key recovery agent

23
Q

a protocol suite for securing IP communications; encrypts and authenticates each IP packet of a session between hosts or networks; can provide protection to a much wider range of applications than SSL or TLS; transparent security protocol; is in the OS or the communication hardware

IP Security (IPsec)
IP
PKE
transport mode

A

IP Security (IPsec)

24
Q

authentication, confidentiality and key management

IPsec TRIAD
IPsec protocols
transport mode
IP Security (IPsec)

A

IPsec protocols

25
Q

encrypts only the data portion (payload) of each packet yet leaves the header unencrypted; used when a device must see the source and destination addresses to route the packet

tunnel mode
confidentiality and authentication
IPsec protocols
transport mode

A

transport mode

26
Q

encrypts both the header and the data portion; generally used in a network-to-network communication

transport mode
tunnel mode
AH
ESP

A

tunnel mode