Chapter 2 Missed Questions Flashcards
What is Asymmetric encryption?
Encryption and decryption use different keys from the same pair
What is Symmetric encryption?
Encryption and decryption use the same secret keys
What are ephemeral keys?
Keys that can only be used once
What are stream ciphers?
Ciphers that operate on one character or bit of a message at a time
What are block ciphers?
Ciphers that operate on large segments of the message at the same time
What is a transposition chipher?
Ciphers that rearrange the characters in a message
What are some popular Symmetric cryptography encryption algorithms?
DES, 3DES, AES, Blowfish, Twofish an RC4
What are some popular Asymmetric cryptography encryption algorithms?
RSA, PGP, and GnuPG
What Symmetric cryptography encryption algorithms are no longer used today?
DES, 3DES, Blowfish, and RC4
What are the approved DSS (Digital Signature Standards) Encryption Algorithms?
DSA, RSA and ECDSA
What standard governs the structure and content of digital certificates?
X.509
What is the most effective method of revoking digital certificates?
OCSP (Online Certificate Status Protocol)
What is certificate stapling?
A technology that allows web servers to attach an OCSP validation to the certificate they send to users
What is another name for a session key?
Ephemeral Key
Is SSL or TLS the more secure transport encryption technology?
TLS, SSL is no longer used because it is considered insecure, as well as TLS 1.1 and TLS 1.2. TLS 1.3 is the current transport encryption technology.