Cryptographic Solutions Flashcards

1
Q

Cryptography

A

Practice and study of writing and solving codes to hide the tru meaning of information

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Encryption

A

Process of converting ordinary information (plaintext) into an unintelligible form (cyphertext)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Data States

A
  • Data at rest
  • Data in transit
  • Data in use
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Algorithm (Cipher)

A

Performs encryption and decryption

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Cryptographic key

A

Essential piece of information that makes the algorithm secure

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Symmetric vs Asymmetric Algorithms

A
  • Symmetric algorithms use the same key for both encryption and decryption. Sometimes called Private Key
  • Asymmetric algorithms use a pair of different keys for encryption and decryption. Sometimes called Public Key
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Hashing

A

One way cryptographic function that produces a unique message digest from an input

No way to recreate the original input, allowing the hash digest to act as a digital fingerprint

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

PKI

A

Public Key Infrastructure is a framework for managing digital keys and certificates

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Steganography

A

Hiding secret data within ordinary, non secret, files or messages, to avoid detection

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Stream vs Block Cypher

A
  • Stream Cypher encrypts data bit by bit. Utilizes a key stream generator which is XOR’d with the data to create the ciphertext. Tend to be symmetric and are good for encrypting real time data
  • Block Cyphers break the data into fixed length blocks and encrypts each one. Will pad data as needed to reach the required block size
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

DES

A

Data Encryption Standard

Symmetric block cipher

Key: 64 bit (functionally 56 bit, due to parity)

Heavily used from the 70’s to 2000’s

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

3DES

A

Triple DES

Symmetric block cipher

Key: three different 56 bit keys (Encrypt, Decrypt, Encrypt). Functionally a 112 bit key

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

IDEA

A

International Data Encryption Algorithm

Symmetric block cipher (64 bit blocks)

Key: 128 bit

Not ever commonly used

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

AES

A

Advanced Encryption Standard

Symmetric block cipher (128, 192 or 256 bit blocks)

Key: 128, 192 or 256 bits (matches block size)

Chose to replace DES/3DES through a contest held by the US government. Current main standard of the US government. Most commonly used cipher and considered to be the strongest

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Blowfish

A

Symmetric block cipher (64 bit blocks)

Key: 32-448 bits

Developed as a replacement for DES, though not widely used. Opensource

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Twofish

A

Symmetric block cipher (128 bit blocks)

Key: 128, 192, 256 bit

Opensource

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

RC4

A

Rivest Cipher 4

Symmetric stream cipher

Key: 40-2048 bits

Used in SSL and WEP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

RC5

A

Rivest Cipher 5

Symmetric block cipher

Key: up to 2048 bits

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

RC6

A

Rivest Cipher 6

Symmetric block cipher

Based on RC5 and entered into the contest to replace DES. Lost to AES

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

How does asymmetric encryption handle the need for Confidentiality?

A

By encrypting with the recipient’s public key, only they can decrypt, with their private key

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

How does asymmetric encryption handle the need for non-repudiation?

A

By encrypting with the sender’s private key, anyone can decrypt it with their public key, validating the sender

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

How does asymmetric encryption handle the need for Integrity?

A

By creating a hash digest of the message which is then encrypted with the sender’s private key (this is a digital signature).

Then you encrypt the message with the receiver’s public key.

This ensures Confidentiality, Integrity and Non0-repudiation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

DH

A

Diffie-Hellman

Key Exchange Algorithm

Often used for sharing private (symmetric) keys, such as for VPN tunnels for IPSec

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

RSA

A

Rivest, Shamair & Adleman

Asymmetric encryption algorithm

Supports key sizes from 1024 to 4096 bits

Relies on the difficulty of factoring large prime numbers

Often used for MFA fobs

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

ECC

A

Elliptic Curve Cryptography

Asymmetric encryption algorithm

Roughly six times more efficient than RSA

Heavily used in mobile and low power devices

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

ECDH

A

Elliptic Curve Diffie Hellman

Asymmetric encryption algorithm

ECC version of Diffie Hellman

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

ECDHE

A

Elliptic Curve Diffie-Hellman Ephemeral

Asymmetric encryption algorithm

ECC version of Diffie-Hellman that uses a different key for each portion of the key establishment process

28
Q

ECDSA

A

Elliptic Curve Digital Signatures Algorithm

Good for Digital Signatures and used by the US government for that

29
Q

MD5

A

Message Digest Algorithm 5

Hashing algorithm

128 bit digest

Very popular, but has issues with collisions due to small digest size

30
Q

SHA

A

Secure hash Algorithm

Family of hashing algorithms, SHA-1, SHA-2 and SHA-3

  • SHA-1 has a 160 bit digest
  • SHA-2 has multiple digest sizes (SHA-224, SHA-256, SHA-348, SHA-512)
  • SHA-3 uses 224 to 512 bit digests, and is more secure than previous versions
31
Q

RIPEMD

A

RACE Integrity Primitive Evaluation Message Digest

Hashing algorithm

Comes 160, 256 and 320 bit version

Opensource, created in competition to SHA

32
Q

HMAC

A

Hash-based Message Authentication Code

Hashing algorithm which is always paired with other hashing algorithms

33
Q

Digital Siganture

A

A hash digest encrypted with a private key, used for ensuring non-repudiation

  1. The sender hashes the message and encrypts it with their private key
  2. The receiver decrypts the the Digital Signature using the sender’s public key
  3. Receiver hashes the message themselves and compares the two
34
Q

DSA

A

Digital Security Algorithm

Asymmetric Encryption Algorithm

Utilized for Digital Signatures, Endorsed by the Federal Government

35
Q

Pass the Hash

A

A hacking technique that allows the attacker to authenticate to a server or service by using the underlying hash of a user’s password instead of the associated plaintext password

36
Q

Birthday Attack

A

Occurs when two different messages result in the same Hash Digest (collision)

37
Q

Key Stretching

A

Defensive technique used to mitigate a weaker key by creating a longer, more secure one.

Used in WPA, WPA2 and PGP

38
Q

Salting

A

Defensive technique that involves adding random data (salt) to passwords before hashing.

Useful for defending against Dictionary attacks, brute force attacks and rainbow tables.

39
Q

Nonces

A

Number Used Once

Defensive technique that involves adding unique, often random, numbers to password based auth.

40
Q

Digital Certificate

A

Binds a public key with an entity’s identity. Commonly uses the X.509 standard, at least within PKI

41
Q

X.509

A

A common digital certificate standard

42
Q

Wildcard Certificate

A

A digital certificate which allows multiple subdomains to use the same certificate. Easier to manage, but extra work when compromised

43
Q

SAN

A

Subject Alternate Name field. Field within a digital certificate, specifying other domains which and addresses which can also use the same certificate

44
Q

Single/Dual sided certificate

A
  • Single sided certificates only require the server to be validated
  • Dual sided certificates require both the server and user to be validated. More secure, but requires more processing power
45
Q

Self Signed Certificate

A

Any certificate which is signed by the same entity which issued it

46
Q

Third party certificate

A

Digital certificate issued and signed by a trusted Certificate Authority 9CA)

47
Q

Root of Trust

A

Highest level of trust in a certification validation

48
Q

CA

A

Certificate Authority. Trusted third party that issues digital certificates

49
Q

RA

A

Registration authority. Requests identifying information from users and forwards requests to CAs for certificate issuance

50
Q

CSR

A

Certificate Signing Request. Block of encoded text with information about an entity requesting a certificate. Submitted to CA in order to get a Certificate

51
Q

CRL

A

Certificate Revocation List. List of all Certificates which have ever been revoked, maintained by CAs

52
Q

OCSP

A

Online Certificate Status Protocol.

Determines certificate revocation status of any certificate. Faster, but less secure than CRL

53
Q

OCSP stapling

A

Online Certificate Status Protocol Stapling

Alternative to OCSP. Allows the certificate holder to get the OCSP record from the server at regular intervals and attaches it to the SSL/TLS handshake

54
Q

TPM

A

Trusted Platform Module

● Dedicated microcontroller for hardware-level security
● Protects digital secrets through integrated cryptographic keys
● Used in BitLocker drive encryption for Windows devices
● Adds an extra layer of security against software attacks

55
Q

HSM

A

Hardware Security Module

● Physical device for safeguarding and managing digital keys
● Ideal for mission-critical scenarios like financial transactions
● Performs encryption operations in a tamper-proof environment
● Ensures key security and regulatory compliance

56
Q

KMS

A

Key Management System

● Manages, stores, distributes, and retires cryptographic keys
● Centralized mechanism for key lifecycle management
● Crucial for securing data and preventing unauthorized access
● Automates key management tasks in complex environments

57
Q

Secure Enclave

A

● Coprocessor integrated into the main processor of some devices
● Isolated from the main processor for secure data processing and storage
● Safeguards sensitive data like biometric information
● Enhances device security by preventing unauthorized access

58
Q

Steganography

A

● Conceals a message within another to hide its very existence
● Involves altering image or data elements to embed hidden information
● Primary goal is to prevent the suspicion that there’s any hidden data at all
● Used alongside encryption for added security
● Detection is challenging due to hiding data in plain sight

59
Q

Tokenization

A

● Substitutes sensitive data with non-sensitive tokens
● Original data securely stored elsewhere
● Tokens have no intrinsic value
● Reduces exposure of sensitive data during transactions
● Commonly used for payment systems to comply with security standards

60
Q

Data Masking

A

● Disguises original data to protect sensitive information
● Maintains data authenticity and usability
● Used in testing environments, especially for software development
● Reduces the risk of data breaches in non-production settings
● Common in industries handling personal data
● Masks portions of sensitive data for privacy, e.g., credit card digits, social
security numbers

61
Q

Rainbow Table

A

Method of reverse engineering Hash Digest back to their source data. Basically sets of precompiled Has/data tables

62
Q

DER

A

Distinguished Encoding Rules

Binary Digital Certificate format, very common

63
Q

PEM

A

Privacy Enhanced Mail

Text Digital Certificate Format. ASCII version of DER

64
Q

PFX

A

Personal Information Exchange

Binary Digital Certificate format, used primarily by WIndows

65
Q

P7B

A

Text Digital Certificate Format used by Windows