Chapter 7 - PKI And Cryptographic Applications Flashcards
Hash Algorithm memorization Chart
Name Hash value length
HAVAL 128, 160, 192, 224, and 256 bits
HMAC Variable
MD2/4/5 128
Secure Hash Algorithm (SHA-1) 160
SHA-224. 224
SHA-256. 256
SHA-384. 384
SHA-512. 512
4 simple rules of public key cryptography and digital signatures
- If you want to encrypt a message, use the recipient’s public key.
- If you want to decrypt a message sent to you, use your private key.
- If you want to digitally sign a message you are sending to someone else, use your private key.
- If you want to verify the signature on a message sent by someone else, use sender’s public key.
Link encryption vs End-to-end encryption
The critical differences between link and end-to -end encryption is that in link encryption, all the data, including the header, trailer, address, and routing data is also encrypted. Therefore, each packet has to be decrypted at each hop so it can be properly routed to next hop and then re-encrypted before it can be sent sling its way.
When encryption happens at higher OSI layers, it is usually end-to-end encryption,and if encryption is done at the lower layers of OSI model, it usually link encryption.
AH vs ESP
AH: provides assurances of message integrity and non repudiation. AH also provides authentication and access control and prevents replay attacks.
ESP: provides confidentiality and integrity of packet contents. It provides encryption and limited authentication and prevents replay attack.
4 basic requirement for ISAKMP
- Authenticate communicating peers
- Create and manage security associations
- Provide key generation mechanism
- Protect against threats (for example, replay and denial-of-service attacks)
Disadvantage of WPA
WPA does not provide an end-to-end security solution. It encrypts traffic only between a mobile computer and the nearest wireless access point. Once traffic hits the wired network, it’s in the clear again.
Link encryption vs End-to-end encryption
The critical differences between link and end-to -end encryption is that in link encryption, all the data, including the header, trailer, address, and routing data is also encrypted. Therefore, each packet has to be decrypted at each hop so it can be properly routed to next hop and then re-encrypted before it can be sent sling its way.
When encryption happens at higher OSI layers, it is usually end-to-end encryption,and if encryption is done at the lower layers of OSI model, it usually link encryption.
AH vs ESP
AH: provides assurances of message integrity and non repudiation. AH also provides authentication and access control and prevents replay attacks.
ESP: provides confidentiality and integrity of packet contents. It provides encryption and limited authentication and prevents replay attack.
4 basic requirement for ISAKMP
- Authenticate communicating peers
- Create and manage security associations
- Provide key generation mechanism
- Protect against threats (for example, replay and denial-of-service attacks)
Disadvantage of WPA
WPA does not provide an end-to-end security solution. It encrypts traffic only between a mobile computer and the nearest wireless access point. Once traffic hits the wired network, it’s in the clear again.
Which cryptographic algorithm forms the basis of the EI Gamal cryptosystems?
The EI Gamal cryptosystems extends the functionality of the Diffie-Hellman key exchange protocol to support the encryption and decryption of messages.
The disadvantage of EI Gamal
It doubles the length of any messages it encrypts. Therefore, a 2048 bit plain text message would yield a 4096 bit cipher text message when EI Gamal is used for the encryption process.
Benefit of elliptic curve cryptosystems
It requires significantly shorter keys to achieve encryption that would be the same strength as encryption achieved with the RSA encryption algorithm. A 1,024 bit RSA key is cryptographically equivalent to a 160- bit elliptic curve cryptosystems key.
Approved standard encryption algorithms
DSA
RSA
ELliptic Curve DSA
meet in the middle attack
Meet in the middle defects encryption algorithms that use two rounds of encryption. This attack is the reason that double DES was quickly discarded as a viable enhancement to the DES encryption.