Cryptography & PKI Flashcards

1
Q

Define Cipher Text

A

Text that has been encrypted for confidentiallity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Define Plain Text

A

Readable text for human comprehension

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Define Symmetric Encryption

A

Encryption using a shared secret key, typically used for bulk encryption

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Define Asymmetric Encrytpion

A

Encryption using a key pair consisting of a private and a public key

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Goals of Cryptology

A

Confidentiality
Integrity
Authentication
Non-Repudiation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Define a Code

A

Substitutes one word or phrase for another

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Define a Cipher

A

A mathematical algorithm for encryption

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Types of Ciphers

A

Stream verses Block

Substitution verses Transposition

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Define a Stream Cipher

A

Encrypts a single character at a time

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Define a Block Cipher

A

Encrypts a chunk of text at a time

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Define a Substitution Cipher

A

Encrypts by changing individual characters

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Define a Transposition Cipher

A

Encrypts by scrambling letters

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Define XOR

A

Exclusive Or;

True when only one input of two or more are true

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Explain the Confusion Principle

A

Hide connection between cipher and key, can be used in stream and block ciphers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Explain the Diffusion Principle

A

Any change in input creates 50% or greater change in output

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Explain the Obfuscation Principle

A

Action taken to make something unclear, unintelligible, or obscure

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

One-Time Pad Criteria

A

2 identical pads
Equal length
Single Use

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Explain Security through Obscurity

A

Security reliant upon secrecy,

Generally disparaged

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

5 Stages of NIST Crypto Lifecycle

A
Initiation
Develop and Acquire
Implement and Assess
Operate and Maintain
Sunset; stop, destroy, or archive
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

DES Key Facts

A

Symmetric
64 bit blocks
56 bit key
Insecure

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

3DES Key Facts

A
Symmetric
64 bit blocks
168 bit key (112 effective key length)
Secure utilizing 3 separate keys
Used in IPsec
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

AES Key Facts

A
Symmetric
128 bit blocks
128, 192, or 256 bit key
Secure
Uses Rijndael block Cipher
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

Blowfish Key Facts

A

Symmetric
64 bit blocks
32-448 bit key
Secure (at larger key sizes)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

Twofish Key Facts

A

Symmetric
128 bit block
128, 192, or 256 bit key
Secure (more complex and faster then Blowfish)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

RC4 Key Facts

A
Symmetric
Stream cipher
40-2048 bit key
Not secure/most common
Used in WEP and SSL
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

Cipher Block Modes

A

ECB
CBC
CR
GCM

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

Describe ECB Mode

A

Electronic Codebook;

Utilize same encryption key for each block

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

Describe CBC Mode

A

Cipher Block Chaining;

Use previous cipher block as key for subsequent blocks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

Describe CR Mode

A

Counter Mode;
Uses nonce plus a counter for encryption key.
Counter increases for each block

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q

Describe GCM

A

Galois Counter Mode;

Adds authentication ability to CR

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
31
Q

Define Stegonography

A

Hiding data in large files

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
32
Q

RSA Key Facts

A

Asymmetric
1024-4096 bit key
Digital certificate with key distribution
Secure

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
33
Q

Define PGP/GnuPG

A

Pretty Good Privacy;
Encrypt with random shared key (symmetric)
Encrypt random key with public key (asymmetric)
GnuPG is open source version

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
34
Q

Define Perfect Forward Secrecy

A

Nodes work independent of one another so that no node knows both final source and destination

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
35
Q

Key Exchange Methods

A

Out-of-band

In-Band

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
36
Q

Explain the Diffie-Hellman Process

A

Select common number and share
Choose secret number and compute results
Share results
Use shared results to create shared secret

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
37
Q

Define DH Group 1

A

768 bit group

Insecure

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
38
Q

Define DH Group 2

A

1024 big group

Insecure

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
39
Q

Define DH Group 5

A

1536 bit group

Insecure

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
40
Q

Define DH Group 14

A

2048 bit group

Secure

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
41
Q

Define DH Group 20

A

384 bit elliptic curve

Secure

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
42
Q

Define DH Group 21

A

521 bit elliptic curve

Secure

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
43
Q

Define DH Group 24

A

2048 bit group
256 bit subgroup
Secure

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
44
Q

Purpose of Key Escrow

A

Government access to keys pending court orders

Key storage backups (debatable)

45
Q

Define Key Stretching

A

Increase strength of passwords by increasing length and/or complexity

46
Q

Key Stretching Methods

A

Salting

Hashing

47
Q

Define Password/Key Salting

A

Add value to a key to increase length

48
Q

Define Password/Key Hashing

A

Adds time with additional math

49
Q

Key Stretching Functions

A

PBKDF2

Bcrypt

50
Q

Define PBKDF2

A

Password Based Key Derivation Function v2;
Uses salt and hash
Minimum of 4000 iterations

51
Q

Define Bcrypt

A

Key stretching utilizing Blowfish algorithm

52
Q

Factors of a Good Hash

A

One way, not reversible
Collision Resistant
Small input change creates large output change

53
Q

Define a Collision

A

Two separate inputs create the same hashed output

54
Q

MD5 Key Facts

A

Message Digest 5
128 bit hash
Not secure

55
Q

SHA1 Key Facts

A

Secure Hash Algorithm
160 bit hash
Not secure

56
Q

SHA2 Key Facts

A

Secure Hash Algorithm 2
224, 256, 384, 512 bit hashes
Secure

57
Q

SHA3 Key Facts

A

Secure Hash Algorithm 3
Produce hash at any fixed input length
Secure?

58
Q

RIPEMD Key Facts

A

RACE Integrity Primitive Message Digest
128, 160, 256, and 320 bit hashes
Secure greater then 128 bit

59
Q

Define HMAC

A

Hash-Based Message Authentication Code;

Compares hashes to verify integrity

60
Q

NIST Approved DSSs

A

DSA
RSA
ECDSA

61
Q

X.509 Digital Certification Process

A

Create key pair
CSR
CA validates ID
CA encrypts Certificate with CA’s private key

62
Q

Certificate Revocation Methods

A

CRL

OCSP

63
Q

Define Certificate Stapling

A

Time stamped certificates with expiration

64
Q

Define Certificate Chaining

A

Transitive trust between CAs, internal CA trusted by 3rd party CA leading to chain of trust

65
Q

Purpose of OIDs

A

Object Identifiers, can be used to trace certificate origins

66
Q

Define Certificate Pinning

A

Ties cert to subject for a period of time

67
Q

Certificate Types

A
Root
Wildcard
Code Signing
Machine/Computer
SAN
DV
OV
EV
68
Q

Explain a Root Certificate

A

Protected highest level of CA with private keys, often taken offline except when needed

69
Q

Define a Wildcard Certificate

A

Match entire domains up to one layer deep

70
Q

Define a DV

A

Domain Validation;

lowest level of validation

71
Q

Define a OV

A

Organizational Validation;

Verify business name

72
Q

Define an EV

A

Extended Validation;
Extensive investigation
Sometimes portrayed as a green locked icon to the left of a browser’s search bar

73
Q

DER File Usage and Extensions

A

Distinguished Encoding Rules (binary format, largely used by Java Platform);
.der
.crt
.cer

74
Q

PEM File Usage and Extensions

A
Privacy Enhanced Mail (ASCII format, largely Linux/Unix systems);
.pem
.crt
.key
.cer
75
Q

PFX File Usage and Extensions

A
Personal Information Exchange;
(binary format, used by Microsoft systems)
.pfx
.p12
(ASCII format, provide Cert chain)
.p7b
.p7c
76
Q

Knowledge Based Attack Types

A

Frequency/pattern
Known plain text
Chosen plain text

77
Q

Define DRM

A

Digital Rights Management;

Watermarking protected content/protecting with encryption

78
Q

Explain Low Power Effect on Encryption

A

May limit key space

79
Q

Explain Encryption Effect on Latency

A

May bottleneck network traffic

80
Q

Explain Cryptographic Resiliance

A

A cipher/algorithm’s resistance to attacks

81
Q

Define Kerckhoff’s Principle

A

Security of algorithm depends on secrecy of the key

82
Q

Define Access Recertification

A

Auditing of account access privileges and permissions for alignment with security policies

83
Q

Define a Nonce

A

A random or pseudo random number used one time to prevent replay attacks

84
Q

DSA Key Facts

A

Digital Signature Algorithm

Similar to RSA but used for authentication only

85
Q

Define ECDSA

A

Elliptic Curve Digital Signature Algorithm

86
Q

Out-of-Band Key Exchange Methods

A

In person
Over the phone
Via courier
DH

87
Q

In-Band Key Exchange Methods

A

Over the network using encryption with recipients public key

88
Q

Common SSL Certificate Errors

A

SSL Certificate Not Trusted
Name Mismatch
Mixed Content
Expired SSL Certificate

89
Q

Describe SSL Certificate Not Trusted Error and Remediation

A

Browser does not recognize CA. Remediate by purchasing and installing certificate from trusted CA.

90
Q

Describe Name Mismatch Certificate Error and Remediation

A

Domain name does not match URL. Double check URL for accuracy and possibly upgrade to dedicated IP address.

91
Q

Describe Mixed Content Error and Remediation

A

Website displays mixed HTTP and HTTPS content. Identify mixed content and adjust source code (if possible).

92
Q

Describe Expired SSL Certificate and Remediation

A

Certificate no longer valid with CA. Renew the certificate.

93
Q

Define SAN Certificate

A

Subject Alternate Name; allows multiple host names to be protected by a single certificate (also called Unified Communications Certificate, UCC)

94
Q

Define a Atbash Cipher

A

Cipher text is alphabetically inverted plain text

95
Q

Define a Caesar Cipher

A

Cipher text is rotated X places from plain text

96
Q

Define ROT13

A

Cipher text is rotated 13 places from plain text

97
Q

Define S/MIME and purpose

A

Secure Multipurpose Internet Mail Extensions, encrypt emails

98
Q

Define DH Group 16

A

4096 bit MODP

99
Q

Define DH Group 17

A

6144 bit MODP

100
Q

Define DH Group 18

A

8192 bit MODP

101
Q

Define DH Group 19

A

256 bit Elliptic Curve

102
Q

Define DH Group 15

A

3072 bit MODP

103
Q

Non-Variable Block Ciphers

A
DES
RC2
Blowfish
Twofish
SkipJack
IDEA
104
Q

RC5 Key Facts

A

Symmetric block cipher

0-2048 bits

105
Q

DH alternative

A

El Gamal

106
Q

Define a CSP

A

Cryptographic Service Provider, generates key pairs for the client

107
Q

Benefit of Centralized Key Management Solutions

A

Key escrow

108
Q

Define a Registration Authority

A

Validates information contained within certificate requests

109
Q

Define a CPS

A

Certificate Practice Statement; an organizations certificate issuing policy