domain 3 set 1 Flashcards
Digital signature require what?
Public Key infrastructures (PKI)
X.509 V.4 is for what?
Certificate Standard
HMAC
Hashed Message Authentication Code (no PKI Used)
Certificates are Digitally signed by who?
(CA) Certificate Authority
The steps in a SSL / TLS connection?
- The client makes a SSL Session
- The Server provides its Certificate with its public key
- the client encrypts with the servers public key
- the server decrypts wit it’s private key.
Main Hashing Algorithms and bit size
- MD-5 128 bits
- SHA-1 160 Bits
- SHA-256 256 Bits
OCSP ?
Online Certificate Status Protocol ( Certificate Revocation)
How to tell if a Certificate has been Revoke
- Online Certificate Status Protocol (OCSP)2. CRL (downloadable list from CA)
Two Documents produce the same Hashed # ?
A collisions
An Attempt to Cause Collisions
Birthday Attacks (Hashing)
Certificates help to prevent what ?
Man in the middle attacks
Symmetric Stream Crypto
RC-4 Used on WEP
4 parts of the Public Key infrastructures (PKI)
- (CA) Certificate Authority
- (RA) Registration Authority
- Certificate Repository
- Certificate Revocation list
A Very Efficient Crypto?
ECC Elliptical Curve Cryptography
what Cryptography is used on Low CPU powered devices?
ECC Elliptical Curve Cryptography
Secure Key-Agreement Without Pre-shared Secrets
Diffie Hellman
First Asymmetric Algorithm
Diffie Hellman
Use Factorization
RSA use a Trap-Door function for it
Digital signature use what Algorithm
RSA
What are the 6 Asymmetric Algorithm
- RSA
- DSA
- ECC = Elliptical Curve Cryptography
- El Gamall
- DH = Diffie Hellman
- Knapsack
Bulk Encryption use What Cryptography Type?
Symmetric
Cryptography used for Key Encryption and distribution
Asymmetric
Asymmetric Algorithm Key Formula
2N
Symmetric Algorithm Key Formula
N=(N-1) /2
SSL / TLS use what for Key Exchange
Asymmetric Algorithm
SSL / TLS use what for Data Exchange
Symmetric Algorithm
In Asymmetric How do we get Authenticity?
Senders Private Key
In Asymmetric How do we get Non-Repudiation?
Hash Encrypted by Senders Private Key
In Asymmetric How do we get Privacy?
Receivers’s Public Key
What is a Digital signature made with?
A hash with the Sender’s Private Key
A Private Key Crypto?
Asymmetric
DEA is what crypto?
DES
DES true key bit size?
56 bit
DES
Bit size
# of Rounds
symmetric
64 bit block size
16 rounds
Block crypto