Encryption Flashcards

1
Q

HMAC

A

Creates a Message Authentication Code used for auth and integrity checking

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

HOTP

A

HMAC-based OTP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

TOTP

A

Type of HOTP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

PAP

A

For logging into network resources, clear text.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

CHAP

A

Hash handshake-based authentication for network resources.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

In-band

A

Key exchange as part of a communication session

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Out-of-band

A

Key exchange outside of the main data communication channel, like phone, internet or physically.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

PSK

A

Preshared key. Symmetrical encryption key that is shared beforehand, out-of-band.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Session key

A

Random private key generated in-band.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Stream cipher

A

Encryption is done per-bit.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Block cipher

A

Encryption is done on blocks of data at a time.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Perfect forward secrecy

A

Creation of a random public key that is session ephemeral, preventing future decryption by compromised keys.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

RIPEMD

A

Hashing function based on RACE.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

NTLMv2

A

NT LAN Manager, hashing process for storing password in the windows registry. Uses HMAC-MD5

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Key stretching

A

Algorithm for increasing the complexity of a key.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Key stretching algorithms

A

PBKDF2 and bcrypt

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

DES

A

old DoD block cipher

18
Q

3DES

A

old, but slightly better DoD block cipher

19
Q

RC

A

Rivest Cipher, family of cryptographic methods

20
Q

RC examples

A

RC4 (stream cipher, used in SSL and WEP) and RC5 (block cipher)

21
Q

Blowfish

A

Symmetrical encryption made as a replacement for DES. Succeeded by Twofish.

22
Q

AES

A

Symmetric encryption standard made by NIST. Block cipher with variable key length.

23
Q

Examples of asymmetrical ciphers

A

RSA and Elliptic-curve

24
Q

RSA

A

Asymmetrical encryption, Rivest-Shamir-Adleman.

25
Q

DH

A

Diffie Hellman key exchange method

26
Q

DHE

A

Diffie Hellman Ephemeral Key

27
Q

ECDHE

A

Elliptic Curve Diffie-Hellman Ephemeral Key

28
Q

DH and related methods allow

A

perfect forward-secrecy

29
Q

CA

A

Certificate Authority

30
Q

CSR

A

Certificate Signing Request

31
Q

CRL

A

Certificate Revocation List

32
Q

OCSP

A

Online Certificate Status Protocol

33
Q

OCSP vs CRL

A

OCSP is a CRL that works automatically over HTTP

34
Q

Cryptographic hash functions

A

Based on a block cipher

35
Q

RA

A

Registration Authority, for requesting certificates

36
Q

The set of all possible permutations of a key is the

A

keyspace

37
Q

Transposition cipher

A

Characters are rearranged, can be extremely complex

38
Q

The only type of stream cipher covered in the exam is

A

RC4, used in WEP and used to be used in SSL/TLS

39
Q

ECC

A

Elliptic curve cryptography

40
Q

IVs vs Nonces

A

Nonces need not be random