Cryptography Flashcards
What is X.509?
A Standard that Defines the Format of PKI (Public Key Infrastructure) digital certificates.
What technology is NOT PKI x.509 compliant and cannot be used in various secure functions?
1. AES
2. PKCS
3. Blowfish
4. SSL/TLS
- Blowfish
What does PKCS stand for?
Public Key Cryptography Standard
What is Asymmetric Encryption?
Uses Public and Private Key pairs.
What is Symmetric Encryption?
Single/Shared Key.
What is Elliptic curve cryptography (ECC) encryption best used for?
Mobile devices.
How many bits does MD5 (Message Digest algorithm) produce?
128 bits.
How many bits does SHA-1 produce?
160 bits
How many bits does SHA-2 produce?
Has 4 functions, outputs are 224, 256, 384 and 512 bits.
How many bits does NTLM produce?
NTLM creates a 128-bit fixed output.
What algorithms does Public Key Infrastructure (PKI) use?
RSA 1024 bit
What is IKE (Internet Key Exchange)?
Protocol used to setup security associations with IPSEC VPNs.
Which encryption type MOST likely is used for securing the key exchange during a client-to-server VPN connection?
ISAKMP
It is used in IPSec, which is commonly used in securing the key exchange during the establishment of a client-to-server VPN connection.
How many bits does RIPEMD hash produce?
160 bits
How many bits are in the Diffie-Hellman (DH) group 1?
768 bits