Cryptography Flashcards

1
Q

What is meant by asymmetric encryption?

A

Public key used to encrypt data, private used to decrypt, very CPU intensive

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is used to digitally sign a packet?

A

Senders private key

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is used to verify a digitally signed packet?

A

Senders public key

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is used to verify a senders public key?

A

Senders public key (digital) certificate

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is used to verify senders public key certificate?

A

Trusted C.A (Certificate Authority)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is a digital certificate?

A

Electronic document certifying public key of an entity (contains digital signature)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is a digital signature?

A

Code derived using private key of an entity

Verified using public key of signing entity to decrypt a hash and compare with CA

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

How would a recipient receive the public key?

A

Receiving senders digital certificate, via in band or out band key exchange

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

When sending encrypted data what key is used to encrypt?

A

Recipients public key, recipient decrypts with private key

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

When receiving encrypted data what key is used to decrypt

A

Recipients private key

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is IKE v1?

A

Establishes VPN IPSec phase 1 (initial control channel) and phase 2 tunnels
Isolated tunnels

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is IKE v2?

A

?

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is in band key exchange

A

Using in session mechanism

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is out of band key exchange

A

Distributing public key manually i.e copying it to computer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What algorithm does session key use?

A

Symmetric encryption algorithm

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What algorithm does public key use?

A

Asymmetric encryption algorithm

17
Q

What is DH Group?

A

Diffie Hellman group
Used to establish shared symmetric session keys
However Diffie Hellman exchange is asymmetrical

18
Q

What steps are carried out in IKE phase 1 tunnel?

A
Negotiates protocols:
H ash (algorithm)
A uthentication
G DH Group
L ifetime
E ncryption (algorithm)
19
Q

What steps are carries out in IKE phase 2 tunnel?

A

Optional: PFS (Perfect Forward Secrecy) runs Diffie Hellman again

20
Q

What is a block cipher?

A

Encryption performed on blocks of data

21
Q

What is a stream cipher?

A

Encryption performed bit by bit

22
Q

What is HMAC?

A

Hashed Message Authentication Code
Uses session key as part of hash formula
Prevents hacker changing data in transit regenerating hash as they don’t have session key

23
Q

What is key escrow?

A

Trusted entity with copy of keys needed for decryption which can be delegated to authorised third parties

24
Q

What is symmetric encryption?

A

Both keys can encrypt and decrypt, used for most use cases as lower CPU overhead

25
Q

What is ECC?

A

Elliptical Curve Cryptography

uses shorter key for lower overhead and good encryption

26
Q

What is ephemeral key?

A

Key used for short period of time, i.e offset of key is used for each packet

27
Q

What is NTLM and NTLMv2?

A

Old prior to kerberos authentication

28
Q

What is PGP/GPG?

A

Pretty Good Privacy

GNU Privacy Guard compliant version of PGP by IETF committee

29
Q

What is DHE and ECDHE?

A

Diffie Hellman Ephemeral

Eliptical Curve Diffie Hellman Ephemeral

30
Q

What is PBKDF2

A

Password Based Key Deviation Function 2

Applies pseudo random functions: hashing, salting, HMAC, encryption to create derived key

31
Q

What is PRNG?

A

Pseudo Random Number Generator