Cryptography Flashcards
Learn cissp
If you want confidentiality when sending email message
then Encrypt the message
If your message must maintain integrity
you must hash the message.
If your message needs authentication, integrity and/or nonrepudiation.
You should digitally sign the message.
If your message requires confidentiality, integrity, authentication, and
nonrepudiation
you should encrypt and digitally sign the message.
Which Algorithm Operates on 64-bit blocks of text has variable-length keys ranging from a relatively
insecure 32 bits to an extremely strong 448 bits.
Blowfish
The AES cipher allows the use of three key strengths
128-bit keys require 10 rounds of encryption.
192-bit keys require 12 rounds of encryption.
256-bit keys require 14 rounds of encryption.
How many version PGP is available ?
Two version
commercial version
Freeware
The commercial version uses
Key exchange ?
Encryption ?
Hashing ?
The commercial version uses
RSA for key exchange,
IDEA for encryption/decryption,
and MD5 for message digest production
The freeware version (based on the extremely similar OpenPGP standard) uses Key exchange ? Encryption ? Hashing ?
Diffie-Hellman key
exchange, the Carlisle Adams/Stafford Tavares (CAST) 128-bit encryption/decryption
algorithm, and
the SHA-1 hashing function.
S/MIME has
already been incorporated in a large number of commercial products, including these:
Microsoft Outlook and Outlook Web Access
Mozilla Thunderbird
Mac OS X Mail
The only
public key cryptographic protocol supported by S/MIME.
RSA
The protocol supports the AES
and 3DES symmetric encryption algorithms.
Common permissions restricted by document DRM solutions
Reading a file Modifying the contents of a file Removing watermarks from a file Downloading/saving a file Printing a file Taking screenshots of file content
How many types of Circuit Encryption ?
Security administrators use two types of encryption techniques to protect data traveling
over networks:
Link encryption protects
End-to-end encryption
What is Link encryption ?
Protects entire communications circuits by creating a secure tunnel
between two points using either a hardware solution or a software solution that
encrypts all traffic entering one end of the tunnel and decrypts all traffic entering the
other end of the tunnel
What is End-to-end encryption ?
End-to-end encryption protects communications between two parties (for example, a
client and a server) and is performed independently of link encryption.