Chapter 10 Sec + Flashcards

1
Q

MD5

A

Message Digest 5

  • is a common hashing algorithm that produces 128-bit hash value

-Cracked and really only used for Checksum to verify integrity of files

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

SHA

A

Secure Hash Algorithm

Are a group of hashing algorithms
With variations grouped into 4 Standards

SHA 0 do not uses
SHA1 creates 160bit hash not used
SHA2 uses 256,224,384,512 bit hashes

Also verifies file integrity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

HMAC

A

Hash Based Message Authentication Code

Is another way to provide integrity
- is a fixed length string of bits similar to MD5 and SHA-256
-uses a Shared secret integrity Key to add some randomness to the result
-provides both integrity and authenticity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

LSASS

A

Local Security Authority Subsystem Security
A place that has password hashes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Credman

A

Credential manager

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

AES

A

Advanced Encryption Standard

Is a strong symmetric Block Cipher that encrypts data in 128-bit blocks

Uses key sizes of 128,192,256 bit keys

More bits used the harder it is to figure out the key

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

3DES

A

Is a Symmetric Block Cipher designed to improve on Legacy Data encrypted Standard (DES)

It Encrypts data using the DES algorithm in 3 separate passes And uses multiple keys
Encrypts data in 64-bit blocks
Key sizes of 112 but and 168 bit

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

CA

A

Certificate Authority
Issue and manage certificates to include
Asymmetric Encryption, authentication and digital signatures

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

ECC

A

Elliptic Curve Cryptography

It uses mathematical equations to formulate an elliptical curve

-Used on low power devices

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

RSA

A

Rivest Shamir Adleman
Is the primary public key Cryptographic algorithm used on the Internet
Uses key sizes of 1024,2048,4096
NIST recommends using 2048 and above keys

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

DSA

A

Digital Signature Algorithm

Uses an Encrypted hash of a message

The hash is encrypted with the senders private key

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

S/MIME

A

Secure/Multipurpose Internet Mail Extensions

Is the most popular standard to digitally sign and encrypt email
-uses both asymmetrical and symmetrical Encryption

Current Verizon uses Cryptographic Message Syntax(CMS) which allows it to use variety of different hashing algorithms and Encryption algorithms

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

PKI

A

Public Key Infrastructure
-is a group of technologies used to request,create,manage,store, distribute,and revoke digital signatures

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

CSR

A

Certificate Signing Request
It includes purpose of cert and information about website and public key and user.

And is formatted using the Public Key Cryptography Standards #10 Specifications

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

RA

A

Registration Authority

Can assist the CA by collecting digital certs registration information

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

CRL

A

Certificate Revocation Lists

Is version 2 certificate that includes a list of revoked certificates identified by Serial numbers

17
Q

OCSP

A

Online Certification Status Protocol

Returns answers such as good, Revoked, or Unknown for Certificates

clients before they use certs verify it’s valid with checks

18
Q

KMS

A

Key Management System

Is a Centralized system or Service Responsible for the Secure Management of Cryptographic Keys used in Various security Applications

19
Q

SAN

A

Subject Alternative Name

Certificate is used for multiple domains that have different names but are owned by the same organization

20
Q

ASCII

A

American Standard Code for Information Interchange

BASE64 encoding converts binary data into ASCII String format

21
Q

CER

A

Canonical Encoding Rules
Is used for ASCII Format

22
Q

DER

A

Distinguish Encoding Rules
Used for Binary Format

23
Q

PEM

A

Privacy Enhanced Mail

-Can be used for almost anything
-Can be converted to CER or DER
-Used to share public keys within a cert, request certs from ca as a CSR, install private keys on server, publish a CRL, or share the full cert chain