Correct Usage of Security Mechanisms & Applied Cryptography Flashcards

1
Q

RTTFM

A

Read The Fucking Manual

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Requirements of a Secure Connectrion

A

It is:
Encrypted
Authenticated
Tamper-proof

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Secure Connection: Encryption How?

A

Public key crypto or session keys

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Secure Connection: Authentication How?

A

Cryptographic certificates

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Secure Connection: Tamper-proof How?

A

Message Authentication Codes (MAC)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Best practice protocol for secure connection

A

Transport Layer Security (TLS)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Encyption

A

Transforming meaningful data into seemingly meaningless gibberish with the possibility of transforming it back

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Symmetric Encryption

A

Same key for decryption and encryption

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Chasllenge of Symmetric Encryption

A

Distribution of keys with other parties securely

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Public-Key Encryption/ Assymmetric Encription

A

Uses a public key to encrypt data and private key to decrypt data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Hybrid Encryption

A

Asymetric Encryption to distribute symmetric key/session key and from there use symmetric encryption

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Message Authentication Codes (MAC)

A

Computes a hash for a message using a symmetric key

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Types of MACs

A

CMAC: MACs based on block cyphers
HMAC: MACs based on Hashing algorithms

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Combinations of Ciphers and MACs

A

Encrypt-then-MAC: First encrypt plaintext, then MAC the resulting ciphertext, then append it to the ciphertext. Most secure

Encrypt && MAC: Encrypt and MAC the plaintext and append the MAC to the ciphertext

MAC-then-Encrypt: MAC the plaintext, then encrypt both the tag and the plaintext

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Digital Signatures

A

Hash message and add hash
Use private key to encrypt hash
Person with public key can decrypt hash and compute the message hash
If hash match, it confirms identity of sender and integrity of message

How well did you know this?
1
Not at all
2
3
4
5
Perfectly