Dion Cryptograph - pg 90 Flashcards

1
Q

What is PGP?

A

Pretty Good Privacy

  • An encryption program
  • Signs, encrypts and decrypts
  • Default uses IDEA (64 bit blocks)
  • Uses both symmetric and asymmetric
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What are the key lengths for PGP?

Symmetric and Asymmetric

A

Symmetric
- 128 bit keys and higher

Asymmetric
- 512 bit to 2048 bit keys

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is GPG?

A

GNU Privacy Guard

  • Updated version of PGP
  • Uses AES for symmetric
  • Cross platform functionality
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is Key Management?

A

How an organization generates, stores, exchanges and uses keys.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is the most important thing in an encryption system?

A

Key strength

- They must be stored securely and changed periodically

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is a One-Time Pad?

A

Stream Cipher that uses a random key that is the same length as the plaintext.

Not commonly used.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is PRNG?

A

Pseudo Random Number Generator

Simulated random number generator

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is Steganography?

A

Hiding a message within another messages
e.g. Text in an image.

Obfuscation not encryption

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is hashing?

A

One-way cryptographic function that produces a hash-digest from plaintext

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What are the 9 hashing algorithms?

A
  1. SHA1
  2. SHA2
  3. SHA3
  4. RIPEMD
  5. MD5
  6. DSA
  7. LANMAN
  8. NTLM Hash
  9. NTLMv2 Hash
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is a Hash Collision?

A

When two different files create the same hash digest. BAD!

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is MD5?

A

Message Digest 5

An old school hashing algorithm
- Created 128 bit hash value

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is SHA1?

A

Secure Hash Algorithm 1

Creates fixed length 160-bit digests

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is SHA2?

A

Secure Hash Algorithm 2

Family of algorithms:
SHA-224
SHA-256
SHA-348
SHA-512
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is SHA3?

A

Secure Hash Algorithm 3

Family of algorithms that creates digests between 224-bits and 512 bits

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is RIPEMD?

A

RACE Integrity Primitive Evaluation Message Digest
Open source

Creates digests of:

  • 160 bit
  • 256 bit
  • 320 bit
17
Q

What is HMAC?

A

Hash-based Message Authentication Code

Creates a code using a hash algo to provide a level of integrity/authenticity - e.g.

HMAC-MD5
HMAC-SHA1
HMAS-SHA256

18
Q

What is DSA?

A

Digital Signature Algorithm

Used to prevent spoofing and protect message integrity

19
Q

What is Code Signing?

A

Digital Signatures on code

20
Q

What is LANMAN?

A

LM Hash

  • Old Windows version of password hashing - Uses DES
  • 14 characters long
21
Q

What is NTLM hash?

A

NT LAN Manager Hash

  • Replacement for LM Hash
  • Uses RC4
  • Released in Windows 3.1 1993
22
Q

What is NTLMv2?

A
  • Replacement for NTLM Hash
  • Uses HMAC-MD5
  • Difficult to crack
  • Used when you don’t have Kerberos Authentication
23
Q

How do you increase hash security?

A

Salting or Key stretching

24
Q

What is salting?

A
  • Adding random data to a hash

- Uses a nonce to prevent password reuse

25
Q

What is Key Stretching?

A

Using multiple hashes to mitigate a weaker key

26
Q

What 4 algorithms use Key Stretching?

A
  1. WPA
  2. WPA2
  3. PGP
  4. bcrypt
27
Q

What are two ways to attack hashes?

A
  1. Pass the Hash

2. Birthday Attack

28
Q

What is Pass the Hash?

A

Where hacker uses the underlying NTLM hash or LM hash to access a remote server/service.

29
Q

How do you defend against Pass the Hash?

A
  • Pen test with Mimikatz
  • Use MFA
  • Only use trusted OS
  • Patch/Update
  • Use least privilege
30
Q

What is a Birthday Attack?

A

Technique where hackers find matching digests for matching birthdays.

31
Q

What are the chances of finding a matching birthday in a group of 57 people and 23 people?

A

57 people - 99%

23 people - 50%

32
Q

How do you prevent a Birthday Attack?

A

Salt?