Cryptography Flashcards
What is X.509?
A Standard that Defines the Format of PKI (Public Key Infrastructure) digital certificates.
What technology is NOT PKI x.509 compliant and cannot be used in various secure functions?
1. AES
2. PKCS
3. Blowfish
4. SSL/TLS
- Blowfish
What does PKCS stand for?
Public Key Cryptography Standard
What is Asymmetric Encryption?
Uses Public and Private Key pairs.
What is Symmetric Encryption?
Single/Shared Key.
What is Elliptic curve cryptography (ECC) encryption best used for?
Mobile devices.
How many bits does MD5 (Message Digest algorithm) produce?
128 bits.
How many bits does SHA-1 produce?
160 bits
How many bits does SHA-2 produce?
Has 4 functions, outputs are 224, 256, 384 and 512 bits.
How many bits does NTLM produce?
NTLM creates a 128-bit fixed output.
What algorithms does Public Key Infrastructure (PKI) use?
RSA 1024 bit
What is IKE (Internet Key Exchange)?
Protocol used to setup security associations with IPSEC VPNs.
Which encryption type MOST likely is used for securing the key exchange during a client-to-server VPN connection?
ISAKMP
It is used in IPSec, which is commonly used in securing the key exchange during the establishment of a client-to-server VPN connection.
How many bits does RIPEMD hash produce?
160 bits
How many bits are in the Diffie-Hellman (DH) group 1?
768 bits
How many bits are in the Diffie-Hellman (DH) group 2?
1024 bits
How many bits are in the Diffie-Hellman (DH) group 5?
1536 bits
How many bits are in the Diffie-Hellman (DH) group 14?
2048 bits
How many bits are in the Diffie-Hellman (DH) group 15?
3072 bits
What is a FREAK attack in SSL?
Type of Downgrade attack to force RSA to use weaker length.
What is a POODLE attack in SSL?
Downgrade from TLSv1.0 to SSLv3.0 to decrypted communication.
What is a DROWN attack in SSL?
Decryption vulnerability in SSLv2.0
What is a Replay Attack?
Used for MITM attack, communication is maliciously or fraudulently repeated or delayed by the attacker.
What is key escrow?
Cryptographic key exchange process in which a key is held in escrow, or stored, by a third party
In this cryptography attack method, the cybercriminal makes a series of interactive queries, choosing subsequent plaintexts based on the information from the previous encryptions?
Adaptive chosen-plaintext attack