Chapter 7 Flashcards
What is the most popular and widely used public key cryptosystem?
RSA
What uses large integers and modular arithmetic to facilitate the secure exchange of secret keys over insecure communications channels.
Diffie-Hellman
What cryptographic algorithm doubles the size of any message that it encrypts?
ElGamal
What are the five requirements for a cryptographic hash function?
The input can be of any length
The output has a fixed length
The hash function is east to compute for any input
Has one-way functionality
Collision resistant
What SHA algorithm produces a message digest using a 1,024-bit block size?
SHA-512
What SHA uses a truncated version of the SHA-512 hash that drop 128 bits to produce a message digest using a 1,024-bit block size?
SHA-384
What SHA produces a message digest using a 512-bit block size?
SHA-256
What SHA uses a truncated version of the SHA-256 hash that drops 32 bits to produce a message digest using a 512-bit block size.
SHA-224
What is based on the Keccak algorithm, provides the same level of security as SHA-2, but is slower than SHA-2?
SHA-3
What message digest algorithm is vulnerable to collisions, preventing its use for ensuring message integrity?
MD5
What hashing algorithm is an alternative to the SHA-2 family that is used in applications such as Bitcoin cryptocurrency implementations?
RIPEMD
What is the most secure version of RIPEMD today?
RIPEMD-160
What security goals are met with the implementation of a digital signature system?
Non-repudiation
Integrity
Authentication
What digital signature algorithm implements a partial digital signature and guarantees the integrity of a message during transmission but doesn’t provide non-repudiation.
HMAC
What are the four rules for public key cryptography and digital signatures?
If you want to encrypt a confidential message, use the recipient’s public key
If you want to decrypt a confidential message sent to you, use your private key
If you want to digitally sign a message you are sending to someone else, use your private key
If you want to verify the signature on a message sent by someone else, use the sender’s public key
What can be combined with MD5, SHA-2, SHA-3 and is more efficient than the digital signature standard.
HMAC
What cryptographic algorithm relies on a shared secret key and does not provide any non-repudiation?
HMAC
What provides communicating parties the assurance that the people they are communicating with truly are who they claim to be.
Digital Certificates
What international standard governs the information contained within digital certificates?
X.509
What describes the use of a series of intermediate CAs?
Certificate Chaining
What type of certificate where the CA simply verifies that the certificate subject has control of the domain name?
Domain Validation Certificates
What type of certificate provides a higher level of assurance, and the CA verifies that the certificate owner is a legitimate business?
Extended Validation Certificates
What are the requirements that must be performed before communicating with someone who provided you their digital certificate.
Verify the digital signature of the CA is authentic
You trust the CA
The certificate is not listed on a CRL or OCSP
The certificate contains the data you are trusting
What method instructs browsers to attach a certificate to a subject for an extended period of time?
Certificate Pinning
What document states the practices a CA employs when issuing or managing certificates?
CPS