Chapter 8 - Cryptography Flashcards

1
Q

How did Caesar cipher his text?

A

page 246

He shifted the letters 3 space to the right.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is Substitution Ciphering?

A

page 246

Where each letter is substituted with another letter

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is Transposition Ciphering?

A

page 247

by changing the order of the group.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

How does ROT13 ciphering work

A

page 278

By rotating the letter to the right 13 places

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is PKI?

A

page 278
Public-Key Infrastructure
Is intended to offer a means of providing security to messages and transaction on a grand scale.
Is a two-key, asymmetric with four main components: certificate authority (CA), registration authority (RA), RSA (the encryption algorithm) and digital certificates.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is an organization that is responsible for issuing, revoking and distributing certificates.

A
page 279
Certificate Authority (CA)
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is the primary difference between and RA and an LRA?

A

page 281
LRA can be used to identify to establish the an individual. LRA involves the physical identification of the person requesting a certificate.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is PKIX?

A

page 266

Public-Key Infrastructure X.509

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is PKCS?

A

page 266

Public-Key Cryptography Standards

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is X.509?

A

page 267
Defines the certificate formats and fields for public keys..
Also defines the procedure that should be used to distribute public keys.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is X.509 v2 for?

A

page 267

CRL (Certificate Revocation List)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is X.509 v3 for?

A

page 267

certificate

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What are Symmetric Algorithms?

A

page 249

Require both ends of an encrypted message to have the same key and processing algorithm.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is DES?

A

page 250
Data Encryption Standard
Has been used since the mid 70s.
It was the primary standard used in the government and industry until replaced by AES

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is AES?

A

page 250

Advanced Encryption Standard

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

RAS is named after who?

A

page 252
Ron Rivest
Adi Shamir
Leonard Adleman

17
Q

What are some Asymmetric Algorithms?

A

page254

  • Diffie-Hellman
  • ElGamal
  • Elliptic Curve (ECC)
  • RSA
18
Q

What three characteristics must Hashing Algorithms have?

A

page 255

  • It must be one-way
  • Variable length input produces fixed length output
  • The algorithm must have few or no collisions
19
Q

What types of Hashing algorithms should you be familiar with?

A

page 255

  • Secure Hash Algorithm (SHA)
  • Message Digest Algorithm (MD)
  • RACE Integrity Primitive Evaluation Message Digest (RIPEMD)
  • GOST
  • LANMAN
  • NTLM
20
Q

What is Key Stretching?

A

page 256

Refers to the process used to take a key that might be a nit weak and make it stronger, usually by making it longer.

21
Q

What methods are there for Key Stretching?

A

page 256

  • PBKDF2 (Password-Based Key Derivative Function 2)
  • Bcrypt
22
Q

What some common code breaking methods?

A

page 257

  • Frequency Analysis
  • Chosen Plaintext
  • Related Key Attack
  • Brute Force Attacks
  • Exploiting Human Error
23
Q

What are the three most important concepts in Security?

A

page 259

  • Confidentially
  • Integrity
  • Availibility
24
Q

What is SET?

A

page 270
Secure Electronic Transaction
Provides encryption for credit card numbers that can be transmitted over the Internet. Visa and MasterCard developed it. SET is most suited fro transmitting small amounts of data.

25
Q

WHat is SSH?

A

page 271
Secure Shell
A tunneling protocol originally used on Unix systems. SSH can be used in place of the older Remote Shell (RSH) utility that used to be a standard in the Unix world. It can be used in place of rlogin and Telnet.

26
Q

What file name extensions should be allowed?

A

page 307

  • ,doc, .docx
  • .pdf
  • .txt
  • .xls, .xlsx
27
Q

What file extension should not be allowed?

A

page 307

  • .bat
  • .com
  • .exe
  • .hlp
  • .pif
  • .scr