Cryptography Flashcards

1
Q

Kerberos Structure

A
Default Authentication protocol/method.
Symmetric and asymmetric.
Made up of a Key distribution Center (KDC)
Authentication Server (AS)
Ticket Granting Service (TGS)
Ticket Granting Ticket (TGT)
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

DES

A

Block Cipher 56 bit outdated, Symmetric

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

3DES

A

Block cipher (3 x 56) 168 bit key. Can use up to 3 keys much slower than des

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

AES

A

block cipher uses 256 keys bits replaces DES much faster

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

IDEA

A

Symmetric key block cipher uses 128 used in PGP originally

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Twofish

A

symmetric key block cipher of about 128 bit blocks keys up to 256

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Blowfish

A

Symmetric block. variable key from 32 to 448 64 bit block size feistel cipher pub domain

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

RC (rivest Cipher)

A

rc2 - rc6

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Diffie-hellman

A

Asymmetric Key exchange protocol. used in ssl and ipsec. can be vuln to mitm if signature waived

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

El Gamal

A

Asymmetric key based on diffie-hellman. used in PGP now. to solve discrete problems for encryption and digital signatures

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

RSA

A

strong uses two prime numbers. Factoring numbers creates keys up to 4096. Encryption and digital signatures.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

MD5

A

128 bit hash 32 digit hexadecimal

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Sha-1

A

160 bit value out

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

sha-2

A

224, 256, 384 512 bit output

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

RIPE-MD

A

The # indicates the bit length. works through 80 stages and then through modulo 32

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

CA

A

3rd party creates and issues digital certificates used to verify identity. keeps track of all certificates within the system. Maintain CRL. Public Key

17
Q

RA

A

RA is responsible for accepting requests for digital certificates and authenticating the entity making the request. An entity that is responsible for one or more of the following functions: the identification and authentication of certificate applicants, the approval or rejection of certificate applications, initiating certificate revocations or suspensions under certain circumstances, processing subscriber requests to revoke or suspend their certificates, and approving or rejecting requests by subscribers to renew or re-key their certificates. RAs, however, do not sign or issue certificates (i.e., an RA is delegated certain tasks on behalf of a CA)

18
Q

Block Cipher 56 bit outdated, Symmetric

A

DES

19
Q

Block cipher 168 bit key. Can use up to 3 keys much slower than des

A

3DES

20
Q

block cipher uses 128, 192, 256 keys bits replaces DES much faster

A

AES

21
Q

block uses 128 used in PGP originally

A

IDEA

22
Q

symmetric key block cipher of about 128 bit blocks keys up to 256

A

Twofish

23
Q

rc2 - rc6

A

Rivest

24
Q

Asymmetric Key exchange protocol. used in ssl and ipsec. can be vuln to mitm if signature waived

A

Diffie-hellman

25
Q

Asymmetric key based of diffie-hellman. used in PGP now. to solve discrete problems for encryption and digital signatures

A

El Gamal

26
Q

strong uses two prime numbers. Factoring numbers creates keys up to 4096. Encrypion and digital signatures

A

RSA

27
Q

128 bit hash 32 digit hexadecimal

A

MD5

28
Q

160 bit value out

A

Sha-1

29
Q

224, 256, 384 512 bit output

A

sha-2

30
Q

The # indicates the bit length. works through 80 stages and then through modulo 32

A

RIPE-MD

31
Q

3rd party creates and issues digital certificates used to verify identity. keeps track of all certificates within the system. Maintain CRL. Public Key

A

CA

32
Q

is responsible for accepting requests for digital certificates and authenticating the entity making the request. An entity that is responsible for one or more of the following functions: the identification and authentication of certificate applicants, the approval or rejection of certificate applications, initiating certificate revocations or suspensions under certain circumstances, processing subscriber requests to revoke or suspend their certificates, and approving or rejecting requests by subscribers to renew or re-key their certificates. RAs, however, do not sign or issue certificates (i.e., an RA is delegated certain tasks on behalf of a CA)

A

RA