domain 3 set 1 Flashcards

1
Q

Digital signature require what?

A

Public Key infrastructures (PKI)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

X.509 V.4 is for what?

A

Certificate Standard

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

HMAC

A

Hashed Message Authentication Code (no PKI Used)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Certificates are Digitally signed by who?

A

(CA) Certificate Authority

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

The steps in a SSL / TLS connection?

A
  1. The client makes a SSL Session
  2. The Server provides its Certificate with its public key
  3. the client encrypts with the servers public key
  4. the server decrypts wit it’s private key.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Main Hashing Algorithms and bit size

A
  1. MD-5 128 bits
  2. SHA-1 160 Bits
  3. SHA-256 256 Bits
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

OCSP ?

A

Online Certificate Status Protocol ( Certificate Revocation)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

How to tell if a Certificate has been Revoke

A
  1. Online Certificate Status Protocol (OCSP)2. CRL (downloadable list from CA)
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Two Documents produce the same Hashed # ?

A

A collisions

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

An Attempt to Cause Collisions

A

Birthday Attacks (Hashing)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Certificates help to prevent what ?

A

Man in the middle attacks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Symmetric Stream Crypto

A

RC-4 Used on WEP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

4 parts of the Public Key infrastructures (PKI)

A
  1. (CA) Certificate Authority
  2. (RA) Registration Authority
  3. Certificate Repository
  4. Certificate Revocation list
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

A Very Efficient Crypto?

A

ECC Elliptical Curve Cryptography

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

what Cryptography is used on Low CPU powered devices?

A

ECC Elliptical Curve Cryptography

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Secure Key-Agreement Without Pre-shared Secrets

A

Diffie Hellman

17
Q

First Asymmetric Algorithm

A

Diffie Hellman

18
Q

Use Factorization

A

RSA use a Trap-Door function for it

19
Q

Digital signature use what Algorithm

A

RSA

20
Q

What are the 6 Asymmetric Algorithm

A
  1. RSA
  2. DSA
  3. ECC = Elliptical Curve Cryptography
  4. El Gamall
  5. DH = Diffie Hellman
  6. Knapsack
21
Q

Bulk Encryption use What Cryptography Type?

A

Symmetric

22
Q

Cryptography used for Key Encryption and distribution

A

Asymmetric

23
Q

Asymmetric Algorithm Key Formula

A

2N

24
Q

Symmetric Algorithm Key Formula

A

N=(N-1) /2

25
Q

SSL / TLS use what for Key Exchange

A

Asymmetric Algorithm

26
Q

SSL / TLS use what for Data Exchange

A

Symmetric Algorithm

27
Q

In Asymmetric How do we get Authenticity?

A

Senders Private Key

28
Q

In Asymmetric How do we get Non-Repudiation?

A

Hash Encrypted by Senders Private Key

29
Q

In Asymmetric How do we get Privacy?

A

Receivers’s Public Key

30
Q

What is a Digital signature made with?

A

A hash with the Sender’s Private Key

31
Q

A Private Key Crypto?

A

Asymmetric

32
Q

DEA is what crypto?

A

DES

33
Q

DES true key bit size?

A

56 bit

34
Q

DES
Bit size
# of Rounds

A

symmetric
64 bit block size
16 rounds
Block crypto