Cryptographic Solutions Flashcards

1
Q

Cryptography

A

Practice and study of writing and solving codes to hide the tru meaning of information

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Encryption

A

Process of converting ordinary information (plaintext) into an unintelligible form (cyphertext)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Data States

A
  • Data at rest
  • Data in transit
  • Data in use
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Algorithm (Cipher)

A

Performs encryption and decryption

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Cryptographic key

A

Essential piece of information that makes the algorithm secure

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Symmetric vs Asymmetric Algorithms

A
  • Symmetric algorithms use the same key for both encryption and decryption. Sometimes called Private Key
  • Asymmetric algorithms use a pair of different keys for encryption and decryption. Sometimes called Public Key
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Hashing

A

One way cryptographic function that produces a unique message digest from an input

No way to recreate the original input, allowing the hash digest to act as a digital fingerprint

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

PKI

A

Public Key Infrastructure is a framework for managing digital keys and certificates

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Steganography

A

Hiding secret data within ordinary, non secret, files or messages, to avoid detection

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Stream vs Block Cypher

A
  • Stream Cypher encrypts data bit by bit. Utilizes a key stream generator which is XOR’d with the data to create the ciphertext. Tend to be symmetric and are good for encrypting real time data
  • Block Cyphers break the data into fixed length blocks and encrypts each one. Will pad data as needed to reach the required block size
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

DES

A

Data Encryption Standard

Symmetric block cipher

Key: 64 bit (functionally 56 bit, due to parity)

Heavily used from the 70’s to 2000’s

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

3DES

A

Triple DES

Symmetric block cipher

Key: three different 56 bit keys (Encrypt, Decrypt, Encrypt). Functionally a 112 bit key

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

IDEA

A

International Data Encryption Algorithm

Symmetric block cipher (64 bit blocks)

Key: 128 bit

Not ever commonly used

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

AES

A

Advanced Encryption Standard

Symmetric block cipher (128, 192 or 256 bit blocks)

Key: 128, 192 or 256 bits (matches block size)

Chose to replace DES/3DES through a contest held by the US government. Current main standard of the US government. Most commonly used cipher and considered to be the strongest

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Blowfish

A

Symmetric block cipher (64 bit blocks)

Key: 32-448 bits

Developed as a replacement for DES, though not widely used. Opensource

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Twofish

A

Symmetric block cipher (128 bit blocks)

Key: 128, 192, 256 bit

Opensource

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

RC4

A

Rivest Cipher 4

Symmetric stream cipher

Key: 40-2048 bits

Used in SSL and WEP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

RC5

A

Rivest Cipher 5

Symmetric block cipher

Key: up to 2048 bits

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

RC6

A

Rivest Cipher 6

Symmetric block cipher

Based on RC5 and entered into the contest to replace DES. Lost to AES

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

How does asymmetric encryption handle the need for Confidentiality?

A

By encrypting with the recipient’s public key, only they can decrypt, with their private key

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

How does asymmetric encryption handle the need for non-repudiation?

A

By encrypting with the sender’s private key, anyone can decrypt it with their public key, validating the sender

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

How does asymmetric encryption handle the need for Integrity?

A

By creating a hash digest of the message which is then encrypted with the sender’s private key (this is a digital signature).

Then you encrypt the message with the receiver’s public key.

This ensures Confidentiality, Integrity and Non0-repudiation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

DH

A

Diffie-Hellman

Key Exchange Algorithm

Often used for sharing private (symmetric) keys, such as for VPN tunnels for IPSec

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

RSA

A

Rivest, Shamair & Adleman

Asymmetric encryption algorithm

Supports key sizes from 1024 to 4096 bits

Relies on the difficulty of factoring large prime numbers

Often used for MFA fobs

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
ECC
Elliptic Curve Cryptography Asymmetric encryption algorithm Roughly six times more efficient than RSA **Heavily used in mobile and low power devices**
26
ECDH
Elliptic Curve Diffie Hellman Asymmetric encryption algorithm ECC version of Diffie Hellman
27
ECDHE
Elliptic Curve Diffie-Hellman Ephemeral Asymmetric encryption algorithm ECC version of Diffie-Hellman that uses a different key for each portion of the key establishment process
28
ECDSA
Elliptic Curve Digital Signatures Algorithm Good for Digital Signatures and used by the US government for that
29
MD5
Message Digest Algorithm 5 Hashing algorithm 128 bit digest Very popular, but has issues with collisions due to small digest size
30
SHA
Secure hash Algorithm Family of hashing algorithms, SHA-1, SHA-2 and SHA-3 - SHA-1 has a 160 bit digest - SHA-2 has multiple digest sizes (SHA-224, SHA-256, SHA-348, SHA-512) - SHA-3 uses 224 to 512 bit digests, and is more secure than previous versions
31
RIPEMD
RACE Integrity Primitive Evaluation Message Digest Hashing algorithm Comes 160, 256 and 320 bit version Opensource, created in competition to SHA
32
HMAC
Hash-based Message Authentication Code Hashing algorithm which is always paired with other hashing algorithms
33
Digital Siganture
A hash digest encrypted with a private key, used for ensuring non-repudiation 1. The sender hashes the message and encrypts it with their private key 2. The receiver decrypts the the Digital Signature using the sender's public key 3. Receiver hashes the message themselves and compares the two
34
DSA
Digital Security Algorithm Asymmetric Encryption Algorithm Utilized for Digital Signatures, Endorsed by the Federal Government
35
Pass the Hash
A hacking technique that allows the attacker to authenticate to a server or service by using the underlying hash of a user's password instead of the associated plaintext password
36
Birthday Attack
Occurs when two different messages result in the same Hash Digest (collision)
37
Key Stretching
Defensive technique used to mitigate a weaker key by creating a longer, more secure one. Used in WPA, WPA2 and PGP
38
Salting
Defensive technique that involves adding random data (salt) to passwords before hashing. Useful for defending against Dictionary attacks, brute force attacks and rainbow tables.
39
Nonces
Number Used Once Defensive technique that involves adding unique, often random, numbers to password based auth.
40
Digital Certificate
Binds a public key with an entity's identity. Commonly uses the X.509 standard, at least within PKI
41
X.509
A common digital certificate standard
42
Wildcard Certificate
A digital certificate which allows multiple subdomains to use the same certificate. Easier to manage, but extra work when compromised
43
SAN
Subject Alternate Name field. Field within a digital certificate, specifying other domains which and addresses which can also use the same certificate
44
Single/Dual sided certificate
- Single sided certificates only require the server to be validated - Dual sided certificates require both the server and user to be validated. More secure, but requires more processing power
45
Self Signed Certificate
Any certificate which is signed by the same entity which issued it
46
Third party certificate
Digital certificate issued and signed by a trusted Certificate Authority 9CA)
47
Root of Trust
Highest level of trust in a certification validation
48
CA
Certificate Authority. Trusted third party that issues digital certificates
49
RA
Registration authority. Requests identifying information from users and forwards requests to CAs for certificate issuance
50
CSR
Certificate Signing Request. Block of encoded text with information about an entity requesting a certificate. Submitted to CA in order to get a Certificate
51
CRL
Certificate Revocation List. List of all Certificates which have ever been revoked, maintained by CAs
52
OCSP
Online Certificate Status Protocol. Determines certificate revocation status of any certificate. Faster, but less secure than CRL
53
OCSP stapling
Online Certificate Status Protocol Stapling Alternative to OCSP. Allows the certificate holder to get the OCSP record from the server at regular intervals and attaches it to the SSL/TLS handshake
54
TPM
Trusted Platform Module ● Dedicated microcontroller for hardware-level security ● Protects digital secrets through integrated cryptographic keys ● Used in BitLocker drive encryption for Windows devices ● Adds an extra layer of security against software attacks
55
HSM
Hardware Security Module ● Physical device for safeguarding and managing digital keys ● Ideal for mission-critical scenarios like financial transactions ● Performs encryption operations in a tamper-proof environment ● Ensures key security and regulatory compliance
56
KMS
Key Management System ● Manages, stores, distributes, and retires cryptographic keys ● Centralized mechanism for key lifecycle management ● Crucial for securing data and preventing unauthorized access ● Automates key management tasks in complex environments
57
Secure Enclave
● Coprocessor integrated into the main processor of some devices ● Isolated from the main processor for secure data processing and storage ● Safeguards sensitive data like biometric information ● Enhances device security by preventing unauthorized access
58
Steganography
● Conceals a message within another to hide its very existence ● Involves altering image or data elements to embed hidden information ● Primary goal is to prevent the suspicion that there’s any hidden data at all ● Used alongside encryption for added security ● Detection is challenging due to hiding data in plain sight
59
Tokenization
● Substitutes sensitive data with non-sensitive tokens ● Original data securely stored elsewhere ● Tokens have no intrinsic value ● Reduces exposure of sensitive data during transactions ● Commonly used for payment systems to comply with security standards
60
Data Masking
● Disguises original data to protect sensitive information ● Maintains data authenticity and usability ● Used in testing environments, especially for software development ● Reduces the risk of data breaches in non-production settings ● Common in industries handling personal data ● Masks portions of sensitive data for privacy, e.g., credit card digits, social security numbers
61
Rainbow Table
Method of reverse engineering Hash Digest back to their source data. Basically sets of precompiled Has/data tables
62
DER
Distinguished Encoding Rules Binary Digital Certificate format, very common
63
PEM
Privacy Enhanced Mail Text Digital Certificate Format. ASCII version of DER
64
PFX
Personal Information Exchange Binary Digital Certificate format, used primarily by WIndows
65
P7B
Text Digital Certificate Format used by Windows