Crypto Study 1 Flashcards

Ch 6 of (ISC)2 CISSP Official Study Guide

1
Q

What are the advantages of ASYMMETRIC KEY encryption?

A
  1. Addition of new users requies generation of only one public-private key pair
  2. Key revocation of one key is easy to accomplish
  3. Provides Repudiation, Authentication and nonrepudiation
  4. Key distribution simple- public key can be made available to anyone and public key cannot derive the private key
  5. No pre-existing communications need to exist (such as sharing a secret key as in symmetric key cryptography).
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Name the modes of DES Symmetric encrption algorithm

A
  1. Cipher Block Mode (CBC)
  2. Cipher Feedback Mode (CFM)
  3. Output Feedback Mode (OFM)
  4. Counter Mode (CTR)
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is a HASH FUNCTION and what is it used for?

A
  1. Hash functions take a message and create a unique output value called a message digest. Message digest by the recipient must match.
  2. Hash functions are used for digital signatures for repudiation
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q
  1. How long is a HASH functions message digest (normally)?
  2. What are the FIVE basic requirements for a cryptographic hash?
A
  1. Most are 128 bits or larger, but can also be derived froma single bit

2. Five basic requirments of a crypto hash:

  1. The input can be of any length
  2. The output has a FIXED length
  3. The hash function is ONE WAY
  4. Hash function is relatively easy to compute for any input
  5. The hash function is collison free
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

1. What is MD4 and how does it work?

2. Is it still secure?

A
  1. MD4 is a message digest algorithm that makes the message 64 bits smaller than 512 bits. It processes 512 bit blocks with a final output of a 128 bit message digest.
  2. It is no longer considered secure- it had a collision problem.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What are the HASH value lengths for HAVAL (MD5 variant) and what does it stand for?

A
  1. Hash of Variable Length
  2. 128, 160, 192, 224 and 256 buts
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q
  1. What is HMAC, what does it stand for and what is its hash value length?
A
  1. Hash Message Authenticating Code (HMAC).
  2. Its key length is variable
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What are the key lengths of:

MD2

MD4

MD%

A

Each has a key length of 128 bits.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is the key length for SHA-1?

A

160 bits

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What does HASHING to messages provide and how can Privacy be

implemented with hashing?

A
  1. Provides Authentication, integrity and non-repudiation.

For privacy the entire message can be encrypted with the public key.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is HMAC and what is it used for?

A
  1. Stands for Hashed Message Authentication Code.
  2. It guarantess integrity but does not provide non-repudiation and cna be combined with SHA-3 using a shared secret key (therefore does not provide non-repudiation).
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What are the algorithms that are part of the DSS (Digital Signature Standard)?

A
  1. DSA (Digital Signature algorithm) in FIPS 186-4
  2. RSA (Rivest-Shamir- Adelman) ANSI x9.31
  3. ECDSA (Elliptic Curve DSA- ANSI x9.62
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

‘What are Schorr and Nyberg-Rueppel?

A

Dignature signature algorithms.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What are these terms associated with certificate authorities (CAs)?

A

CPV= Certificate path validation

Enrollment= you supply your public key and CA issues a digitally signed certificate

Verification= Using the CAs piblic key to verify a certificate is authenticate

CRL= Certificate revocation list or OCSP= Online Certificate Status Protocol

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

1. What are the specific disk encryption technologies for Windows?

2. What about Mac OS?

3. What does OS Vera Crypt support?

A
  1. BitLocker amd EFS (Encrypting File System)
  2. FileVault encryption
  3. Linux, Windows, and Mac
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What should you do if your require confidentiality

with an e-mail?

A

You should encrypt the message.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

If you need to ensure integrity of an

e-mail message what should you do?

A

You should digitally sign the message

18
Q

What should you apply to an e-mail if you need authentication, integrity and/or non-repudiation?

A

You should digitally sign the message.

19
Q

What should you apply to an e-mail if your message requires authentication, integrity, non-repudiation and confidentiality?

A

You should encrypt and digitally sign your message.

20
Q

What is PGP and what are some of the commercial versions used for?

A

PGP is Pretty Goof Privacy and is an e-mail encryption algorithm. The commercial version provides the following:

  1. RSA for KeyExchange
  2. IDEA for encryptio/decryptio
  3. MD5 for message digest
21
Q

What types of encryption does the Freeware version of PGP use for encryption and for key management?

A
  1. Cast for encryption/decryption
  2. Diffie-Hellman for key exchange
22
Q

What does S/MIME stand for and what encryption

algorithm does S/MIME use?

A
  1. Secure Muliti-Purpose Mail Extension
  2. RSA
23
Q

What is Link Encryption?

A

It is encryption that encrypts traffic entering the tunnel on one end and decrypts it on the other end. This ensures communications are secure between to distinct points.

24
Q

What is end to end encryption?

A

Protect communicatiosn between two parties (e.g. user and server). This portects from monitoring on an encrypted side or traffic sent over an unencrypted link.

25
Q

What are the differences between Link Encryption and

End to End encryption?

A

Link encryption includes the data, the header, trailer, address and routing data, whihc means it must be decrypted and reencrypted from hop to hop.

End to end encryption only encrypts only the data, so it moves faster during transmissions.

26
Q

What are the two main components of IPSEC?

A
  1. The AH (Authenication Header) which provides message integrity and non-repudiation, authentication, access control and prevents replay attacks.
  2. ESP (Encapsulating Security Payload) provides confidentiality and integrity of packet contents only, provides encryption and limited authentication, prevents replay attacks.
27
Q

What are the two function modes of IPSEC?

A
  1. Transport Mode- only packet and payload protected, used for peer to perr
  2. Tunnel Mode- entire packet inlcuidng the header is encrypted. For gateway to gateway communications.
28
Q

What protocl is IPSEC often paired with?

A

L2TP- Layer 2 Tunneling Protocol

29
Q
  1. What is used to set up an IPSEC session?
  2. How many sessions do you need for bi-directional communication?
  3. How many sessions do you need if you set up bi-directional with AH and ESP?
A
  1. A Security Association (SA)
  2. If you want to set up biderectional comm. you need two SAs.
  3. If you want to set up bidirectionla using AH and ESP you need 4 SA’s.
30
Q
  1. What is WEP?
  2. How many bits is it?
  3. What networkign standard is it described in?
  4. Is it secure?
A
  1. Wireless Encryption Protocol
  2. 64 and 128 bits
  3. IEEE 802.11
  4. No it was replaced by WPA
31
Q
  1. What is WPA2?
  2. How was it improved over WEP?
  3. What wireless security standard is it used in?
A
  1. Wifi Protected Access
  2. Temporal Key Integrity Protocol (TKIP) and AES encryption
  3. 802.1X, must use a supplicant
32
Q

What is an analytic attack?

A
  1. A cryptographic attack where algabraic manipulation is done to reduce the complexity of the algorithm (attack on logic)
33
Q

What is an implementation attack?

A

It’s an attack that exploits the weakness in the implementation of the cryptosystem, exploit of software code, focus on methodology of the code

34
Q

What is a statistical attack?

A

An attack on a crypto system that attempts to exploit statistical weakness such as floating-point errors and inability to produce truly random numbers, looks for vulnerability in the hardware and OS hosting the application.

35
Q

What is a Rainbow table?

A
  1. A table of pre-computed values for cryptographic hashes

fpr passwords stored in hash form, Used for password cracking.

36
Q
  1. What is a SALT?
  2. What can it be combined with to make it more effective?
  3. What are some hashing functions?
A
  1. It is a random value added to the end of a password before the OS hashes the password
  2. Key Stretching
  3. PBKDF2, bcrypt and scrypt
37
Q

How do the following crypto attacks work:

  1. Known plaintext
  2. Chosen ciphetext
  3. Chosen Plain text
A
  1. Using an encrypted copy of the message and the plaintext
  2. Having the ability to decrypt a portion of the cipher text message and use the decrypted portion to discover the key
  3. Can encrypt chosen plaintext, then anlayze the output of the ciphertext
38
Q

How does the following crypto attack work:

Meet in the Middle

A

Used for TWO round encryption. Takes known plaintext, encrypt using every possible key (k1), equivalent ciphertext decrypted using all possible keys (k2). When a match is found k1 and k2 represent both portions of the double encryption.

39
Q

How does the Birthday attack work

and what is it also known as?

A

Seeks to find flaws in the one to one nature of hashing. Works by substitution of a digitally signed message with the same message digest thereby maintaining the validity of the original digital signature.

The birthday attack is also known as the collison attack and reverse hashing

40
Q

What is a replay attack?

A

Interecept encrypted messages between two parties (most likely request for authentication), then replays the captured session to open a new session. Can be defeated by time stamps or expiration periods.