CRYPTOGRAPHIC SOULTIONS Flashcards

1
Q

symmetric key

A

You have the same key as the main owner. Shares similiar details.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Asymmetric Key

A

Two different keys one for decryption and one to encrpyt.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

DES-DATA ENCRYPTION STANDATD

A

Uses 64bit blocks. Key strength is only 56-bits.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

TRIPLE DES 3DES

A

Three diffrent 56 bit keys.I

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

IDEA International data encryption algorithm

A

SYMMETRIC BLOCK AND USES 64 BIT BLOCKS.KEY SIZE IS 128 not used as much

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

AES-ADAVANCED ENCRYPTION STANDARD

A

SYMMETRIC BLOCK USES 128,192 OR 256 BIT BLOCKS.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Blowfish

A

Symmetic block cipher that uses 64bit 4048 bits also.Not widelly used

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

TWOFISH

A

Provices 128 bit 192 or 256 encryption keys open source

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

RC CIPHER SUITE

A

RIVEST CIPHER
r

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

RC4

A

40 BITS AND 2048 USED FOR SSL AND WEP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

RC5

A

UO TO 2048 BITS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

RC6

A

STRONGER THEN RC5

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

assymetric algorithms

A

Public and private key
USIA CIA TRAID AND NON-REPUDIATION

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

DIGITAL SIGNATIURE

A

USES YOUR PRIVATE KEY FOR INTEGRITY

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

DIFFIE-HELLMAN

A

Used to conduct key exchanges and secure key like VPN’s over a unsecure network
ASSYMETRIC

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

RSA

A

Assymmetric used for signatures key exchange and uses prime numbers 1024-4068

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

ELLIPTIC CURVE CRYPTOGRAPHY

A

USED IN MOBILE DEVICES AND BASED ON ALGEBRAIC STRUCTURES. 256 bit key

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

HASHING

A

One way cypto function and take an inpit and produces a unique message in the output

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

MD5

A

Creats 128 bit and most popular.limited in unique values.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

SHA-SECURE HASH ALROGITHM

A

SHA-1:160 bit has digest
SHA 2: longer digest 224,256,384,512
SHA 3: 224 and 512 bits but major increase in security.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

RIPEMD RACE INTEGRITY PRIMITIVE ECALUATION MESSAGE DIGEST

A

160,256,320 BIT. 160 BIT IS COMMANLY USED

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

RIPEMD-160

A

OPEN SOURCE

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

HMAC HASH BASED MESSAHE AUTH CODE

A

USED TO CHECK THE INTERGRITY OF A MESSAGE.
HMAC-MD5, SHA1 SHA256 ETC

24
Q

GOV USES DIGITAL SCURITY STANDARD

A

160 BIT BUT OTHER COMPANIES USE RSA CAUSE ITS FASTER.

25
Q

KEY STRECTHING- TO INCREASE KEY

A

Weaker key becomes stronger to get a more secure key.

26
Q

SALTING

A

RANDOM DATA INTO A ONE CRYPTOGRAHIC HASH TO HELP PROTECH AGIANST PASSWORDS

27
Q

DICTIONARY ATTACK

A

ATTACKER TRIES EVERY WORD FROM A PREDEFINED LIST.

28
Q

BRUTE FORCE ATTACK

A

TREIS EVER POSSIBLE PASSWORD COMBO

29
Q

RAINBOW TANLES

A

TABLES FOR REVERSTING CRYPTOGRAPHIC HASH FUNCTIONS

30
Q

NONCE

A

NUMBER USED ONCE. UNIQUE NUMBER FOR AITHENTICATION PROCESS.

31
Q

INCORRECT PASSWORDS LOCK ACCOUNT

A

IDEALLY 3 TIMES TO LOCK PASSWORD TO STOP ATTACKS.

32
Q

PUBLIC KEY INFRASTRCURE

A

BASED ON ASYMMETRIC ENCRYPTION ALSO HTTPS

33
Q

CERTIFICATE AUTHORITY

A

Digital certs and keeps the level of trust between all of the cert authorities around the world.

34
Q

KEY ESCROW

A

Process where crypto keys are stored in a secure third-party location.

35
Q

DIGITAL CERTS

A

Combines a public key with user identity x.509 protocol

36
Q

wildcard cert

A

allows all of the subdomains to use same public key certs. Save money and can be easier to manage.

37
Q

SINGLE SIDED CERT

A

ONLY REQUIRES THE SERVER TO BE VALIDATED.

38
Q

DUAL SIDE CERT

A

USES SERVER AND USERS TO BE VALIDATED

39
Q

SELF SIGN CERT

A

DIGITAL CERT ARE SIGNED BY THE SAME ENITIY.

40
Q

THIRD PARTY CERT

A

DIGITA CERT ISSUED BY A CERT AUTHORITY

41
Q

ROOT OF TRUST

A

EACH CERT IS VALIDATED USING CONCEPT OF ROOT OF TRUST. MOVES FROM BOTTOM ALLT EH WAY TO THE TOP. TRUSTED VERIFIED PROVIDER

42
Q

CERT AUTHORITY

A

TRUSTED 3RD PART IS ISSUES DIGITAL CERTS.

43
Q

REGISTRATION AUTHORITY

A

REQUEST IDENTIFYING INFO FROM THE USER AND FORWARDS THAT CERT REQUEST UP TO THE CA AND CREAT THE DIGITAL CERT

44
Q

CERT SIGNING REQUEST

A

OBTATING YOUR DIGITAL CERT. NAME DOMIAN NAME LOCALITY AND COUNTRY

45
Q

CERT REVOCATION LIST

A

ONLINE LIST OF DIGITAL CERTS THE CA HAS ALREADY REVOKED DUE TO A DATA BREACH

46
Q

OCSP

A

ONLINE CERT SERVICE PROTCOL DETERMINES REVOCATION STATUS USING SERIAL NUMBER

47
Q

OCSP STAPLING

A

ALLOWS THE CERT HOLDER TO GET THE OCSP RECORD FROM SERVER AT REGULAR INTERVALS. SSL OR TLS HANDSHAKE

48
Q

PUBLIC KEY PINNING

A

ALLOWS HTTPS WEBSITE TO RESIST IMPERSONATION ATTACKS.

49
Q

KEY ESCROW AGENTS

A

OCCUES WHEN SECURE COPY OF A USERS PRIVATE KEY IS BEING HELD IF THEY ACCIDENTALLY LOST IT.

50
Q

KEY RECOVERY AGENT

A

RESTORE CORRUPTED OR LOST KEY

51
Q

TPM TRUST PLATFORM MODUE

A

A MICRO CONTROLLER DESIGNED TO SECURE HARDWARE THRY INTERGRATED CRYPTO KEYS. ALSO KNOWN USING BIT LOCKER

52
Q

HSM HARDWARE SECURITY MODULE

A

HIGH SECURITY BANK VALULT. FINANCCE TRANSTIONS

53
Q

KEY MANAGEMENT SYSTEM

A

MANAGES AND STORES AND DISTRUBTES KEYS AND DELETES IF NEEDED

54
Q

SECURE ENCLAVE

A

INTEGRATED INTO MAIN PROCESSOR OF SOME DEVICES.CFINGER PRINTS FACIAL AND APPLE PAY

55
Q

DOWNGRADE ATTACKS

A

AIMES TO FORCE A SYSTEM INTO A WEAKER/OLDER PROTOCOL. THIS CAN EXPLOIT WEAKNESS

56
Q

COLLISION ATTACK

A

FIND TWO DIFFERENT INPUTS THAT HAVE THE SAME HASH OUTPUT.

57
Q

Diffie-Hellman

A

an is an asymmetric cryptographic technique specifically designed for securely exchanging cryptographic keys over public channels, allowing two parties to generate a shared secret without having previously met.