Cryptography and PKI . Flashcards
Forensic investigators must take steps to ensure that they do not accidentally tamper with evidence and that they preserve the _____ of _____ documenting evidence handling from collection until use in court.
Chain of Custody
When performing forensic analysis, be certain to observe the _____ of ______ and capture information that is not likely to exist for a long period of time first.
Order of Votality
Common use cases for encryption include:
- Providing confidentiality for sensitive information.
- Confirming the integrity of stored or transmitted information.
- Authenticating users.
(T/F)?
True!
What are the two basic cryptographic operations?
- Substitution
- Transposition
In terms of cryptographic operations, what is Substitution?
Modifies characters
In terms of cryptographic operations, what is Transposition?
Moves characters around
_______ encryption uses the same shared secret for encryption and decryption.
Symmetric
In _______ encryption, users each have their own public/private keypair.
Assymetric
In asymmetric encryption, in regards to Confidentiality, the Sender Encrypts with the Recipient’s _____ key.
Public
In asymmetric encryption, in regards to the Digital Signature, the Sender Encrypts with the Sender’s _____ key.
Private
In asymmetric encryption, in regards to Confidentiality, the Recipient Decrypts with the Recipient’s _____ key.
Private
In asymmetric encryption, in regards to the Digital Signature, the Recipient Decrypts with the Sender’s _____ key.
Public
Anything encrypted with one key from a pair may only be decrypted with the other key from that same pair (T/F)?
True!
This is the formula for which type of cryptography?
n(n-1) / 2 keys
Symmetric Cryptography
This is the formula for which type of cryptography?
2 n keys
Asymmetric Cryptography
What secure Symmetric Algorithms are there?
- 3DES
- AES
- IDEA
- Twofish
- Blowfish
Are DES and RC4 secure?
No
What asymmetric algorithms are there?
- RSA
- El Gamal
- Elliptic Curve (ECC)
The _____-______ may be used for secure exchange of symmetric keys.
Diffie-Hellman
______ are one-way functions that produce a unique value for every input and cannot be reversed.
Hashes
Common hashing algorithms include SHA, HMAC and RIPEMD (T/F)?
True!