Crypto Study 1 Flashcards
Ch 6 of (ISC)2 CISSP Official Study Guide
What are the advantages of ASYMMETRIC KEY encryption?
- Addition of new users requies generation of only one public-private key pair
- Key revocation of one key is easy to accomplish
- Provides Repudiation, Authentication and nonrepudiation
- Key distribution simple- public key can be made available to anyone and public key cannot derive the private key
- No pre-existing communications need to exist (such as sharing a secret key as in symmetric key cryptography).
Name the modes of DES Symmetric encrption algorithm
- Cipher Block Mode (CBC)
- Cipher Feedback Mode (CFM)
- Output Feedback Mode (OFM)
- Counter Mode (CTR)
What is a HASH FUNCTION and what is it used for?
- Hash functions take a message and create a unique output value called a message digest. Message digest by the recipient must match.
- Hash functions are used for digital signatures for repudiation
- How long is a HASH functions message digest (normally)?
- What are the FIVE basic requirements for a cryptographic hash?
- Most are 128 bits or larger, but can also be derived froma single bit
2. Five basic requirments of a crypto hash:
- The input can be of any length
- The output has a FIXED length
- The hash function is ONE WAY
- Hash function is relatively easy to compute for any input
- The hash function is collison free
1. What is MD4 and how does it work?
2. Is it still secure?
- MD4 is a message digest algorithm that makes the message 64 bits smaller than 512 bits. It processes 512 bit blocks with a final output of a 128 bit message digest.
- It is no longer considered secure- it had a collision problem.
What are the HASH value lengths for HAVAL (MD5 variant) and what does it stand for?
- Hash of Variable Length
- 128, 160, 192, 224 and 256 buts
- What is HMAC, what does it stand for and what is its hash value length?
- Hash Message Authenticating Code (HMAC).
- Its key length is variable
What are the key lengths of:
MD2
MD4
MD%
Each has a key length of 128 bits.
What is the key length for SHA-1?
160 bits
What does HASHING to messages provide and how can Privacy be
implemented with hashing?
- Provides Authentication, integrity and non-repudiation.
For privacy the entire message can be encrypted with the public key.
What is HMAC and what is it used for?
- Stands for Hashed Message Authentication Code.
- It guarantess integrity but does not provide non-repudiation and cna be combined with SHA-3 using a shared secret key (therefore does not provide non-repudiation).
What are the algorithms that are part of the DSS (Digital Signature Standard)?
- DSA (Digital Signature algorithm) in FIPS 186-4
- RSA (Rivest-Shamir- Adelman) ANSI x9.31
- ECDSA (Elliptic Curve DSA- ANSI x9.62
‘What are Schorr and Nyberg-Rueppel?
Dignature signature algorithms.
What are these terms associated with certificate authorities (CAs)?
CPV= Certificate path validation
Enrollment= you supply your public key and CA issues a digitally signed certificate
Verification= Using the CAs piblic key to verify a certificate is authenticate
CRL= Certificate revocation list or OCSP= Online Certificate Status Protocol
1. What are the specific disk encryption technologies for Windows?
2. What about Mac OS?
3. What does OS Vera Crypt support?
- BitLocker amd EFS (Encrypting File System)
- FileVault encryption
- Linux, Windows, and Mac
What should you do if your require confidentiality
with an e-mail?
You should encrypt the message.