Chapter 4: Advanced Cryptography Flashcards

1
Q

What are Session Keys?

A

Symmetric keys used to encrypt & decrypt info exchanged during the session (layer 6 of OSI model)

between browser and web server to verify integrity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is a Digital Certificate/

A

Associates a user’s identity to a public key that has been “digitally signed” by a trusted third party

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is a CA?

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is a CSR?

A

Certificate Signing Request - Process to obtain digital certificate

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is the process of obtaining a certificate?

A
  1. Generate public and private key pair
  2. Sign the CSR with the public key
  3. Send CSR to the Registration Authority (RA) to verify authenticity
  4. After verification and the CSR is processed, a cert is issued via a intermediate certificate authority
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is a CR?

A

Certificate repository - A publicly accessible centralized directory of digital certificates used to view certificate status

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is a CRL?

A

Certificate Revocation List

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is OCSP?

A

Online Certificate Status Protocol - Performs real time look up of a certificate’s status

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is OCSP stapling?

A

Improves performance by positioning a digitally-signed and time-stamped version of the OCSP response directly on the webserver.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is a Root digital certificate?

A

Beginning point of the chain, created & verified by a CA;
Self-signed & does not depend on a higher authority

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is Certificate chaining?

A

Process of verifying a digital vertificate is genuine

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is a User digital certificate?

A

End point of the chain

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is a web of trust in trust models?

A

A user signs a digital certificate then exchanges it with all other users

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is PKI?

A

Public Key Infrastructure - A framework for all entities involved in digital certificates

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is a third-party trust in trust models?

A

Two parties trust eachother because they both trust a third party that knows them individually

A trust eachother B, because they both trust C

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is a Hierarchial Trust Model?

A

Signs all digital certificate authorities with a single key (Root)

16
Q

What is a Distributed Trust Model?

A

Multiple certificate authorities that sign digital certificates

17
Q

What is a Bridge Trust Model?

A

One CA interconnects with other CA’s

18
Q

What is a CP?

A

Certificate Policy - A publish set of rules that govern operation of a PKI

19
Q

What is a CPS?

A

A technical document that describes in detail how the CA uses & manages certificates

20
Q

What is an Escrow?

A

A process where keys are managed by a third pary such as trusted certificate authority

21
Q

What is Revocation?

A

Early revoking - cannot be renewed

22
Q

Why is TLS better than SSL?

A

It removes support for MD5 and SHA-224, requires use of Perfect Forward Secrecy for public key–based key exchange, and encrypts handshake messages after the ServerHello exchange.

23
Q

What is a Cipher Suite?

A

It is a named combination of the encryption, authentication, and message authentication code (MAC) algorithms that is used with TLS.

24
Q

What is IPSec?

A

A protocol suite for securing IP (Network Layer) communications
-Transparent
-Authenticates packets received
-Manages keys to ensure they are not intercepted

25
Q

What is S/MIME?

A

Secure/Multipurpse Internet Mail Extensions - A protocol fo secring email messages

26
Q

What is SRTP/

A

Secure Real-time Transport Protocol - A secure extension protecting transmisson using Real-time Transport Protocol

27
Q

What is a block cipher mode of operation?

A

Specifies how block ciphers should handle these blocks

28
Q

What is CBC?

A

Cipher Block Chaining - Output of a round of encryption as input for next-round

29
Q

What is GCM?

A

Galois/Counter - A mode both encrypts plaintext and computes a message authentication code (MAC) to ensure that the message was created by the sender and that it was not tampered with during transmission

30
Q

What determines Key Strength?

A
  1. Randomness
  2. Cryptoperiod
  3. Key Length
31
Q

IPSec is considered a transparent security protocol, what does that entail?

A

-Programs do not hae to be modified to run under IPSec
- No user training
- Does not require software changes