Cryptographic Solutions Flashcards

1
Q

Steps to create a digital certificate

A
  1. Create a key pair using your chosen encryption algorithm.
  2. Generate a Certificate Signing Request (CSR), containing the public key and identification information.
  3. Submit the CSR to a Certificate Authority (CA).
  4. The CA verifies the requester’s identity.
  5. Once verified, the CA transfers the public key and identity to an x.509 certificate.
  6. The CA signs the certificate with its private key and returns it to the requester.
  7. The requester can share the certificate for secure communication.
  8. Third parties can verify the certificate’s validity by checking the CA’s digital signature.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is encryption?

A

Process of converting ordinary information (plaintext) into an unintelligible form (ciphertext)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Describe the 3 states of data

A

Data at rest: data being archived, sitting in a hard drive device or storage device.
Data in transit moves across the network, resides inside RAM, or moves to and from the processor.
Data in use: undergoing a current constant state of change, data in the processor.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is a symmetric algorithm?

A

Symmetric algorithms use the same key for both encryption and decryption.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is an asymmetric algorithm?

A

Asymmetric algorithms use a pair of keys, a public key for encryption and a private key for decryption.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is the difference between a stream cipher and a block cipher algorithm?

A

Stream ciphers convert one symbol of plaintext directly into a symbol of ciphertext. Block ciphers encrypt a group of plaintext symbols as one block. Simple substitution is an example of a stream cipher. Stream ciphers are good for securing real-time communication data streams like streaming audio or video. Stream ciphers tend to be symmetric algorithms.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Name the most common symmetric algorithms

A

DES, 3DE, IDEA, AES, Blowfish, Twofish, Rivest Ciphers (RC4, RC5, RC6). RC4 is the only stream cipher. AES (Advance Encryption Standard) is the strongest.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Name the most common asymmetric algorithms

A

Diffie-Hellman: Used for key exchange inside of creating a VPN tunnel establishment as part of IPSec.
RSA (Rivest-Shamir-Adleman): relies on the mathematical difficulty of factoring large prime numbers.
Elliptic Curve Cryptography (ECC): most commonly used for mobile devices and low-power computing devices.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Define hashing

A

Hashing is a one-way cryptographic solution that takes an input and produces a unique message digest as its output.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Name hashing algorithms

A

MD5, SHA Family, RIPEMD, HMAC.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Name two common hashing attacks

A

Pass the hash attack
Birthday attack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Define “Pass the hash attack”

A

A hacking technique that allows an attacker to authenticate to a remote server or service by using the underlying hash of a user’s password instead of requiring the associate plaintext password.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Define “Birthday attack”

A

An attacker is able to generate a collision. (sends two different messages through a hash algorithm and it results in two identical digests)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

How can we increase the strength of a hash?

A

Use hashes with long output digest, like choosing SHA-256 over MD5.
Key stretching: applying multiple rounds of hashing to a password to make it more computationally expensive to crack.
Salting: adding additional random data to a password before hashing it. To prevent rainbow attacks.
Nonce (number used once): Nonce: A random number used to prevent attacks and ensure the uniqueness of the password. To prevent replay attacks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is the Public Key Infrastructure (PKI)?

A

Framework for managing digital keys and certificates that facilitates secure data transfer, authentication, and encrypted communications over networks. PKI uses public key cryptography.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly