Encryption Flashcards

1
Q

HMAC

A

Creates a Message Authentication Code used for auth and integrity checking

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

HOTP

A

HMAC-based OTP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

TOTP

A

Type of HOTP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

PAP

A

For logging into network resources, clear text.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

CHAP

A

Hash handshake-based authentication for network resources.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

In-band

A

Key exchange as part of a communication session

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Out-of-band

A

Key exchange outside of the main data communication channel, like phone, internet or physically.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

PSK

A

Preshared key. Symmetrical encryption key that is shared beforehand, out-of-band.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Session key

A

Random private key generated in-band.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Stream cipher

A

Encryption is done per-bit.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Block cipher

A

Encryption is done on blocks of data at a time.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Perfect forward secrecy

A

Creation of a random public key that is session ephemeral, preventing future decryption by compromised keys.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

RIPEMD

A

Hashing function based on RACE.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

NTLMv2

A

NT LAN Manager, hashing process for storing password in the windows registry. Uses HMAC-MD5

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Key stretching

A

Algorithm for increasing the complexity of a key.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Key stretching algorithms

A

PBKDF2 and bcrypt

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

DES

A

old DoD block cipher

18
Q

3DES

A

old, but slightly better DoD block cipher

19
Q

RC

A

Rivest Cipher, family of cryptographic methods

20
Q

RC examples

A

RC4 (stream cipher, used in SSL and WEP) and RC5 (block cipher)

21
Q

Blowfish

A

Symmetrical encryption made as a replacement for DES. Succeeded by Twofish.

22
Q

AES

A

Symmetric encryption standard made by NIST. Block cipher with variable key length.

23
Q

Examples of asymmetrical ciphers

A

RSA and Elliptic-curve

24
Q

RSA

A

Asymmetrical encryption, Rivest-Shamir-Adleman.

25
DH
Diffie Hellman key exchange method
26
DHE
Diffie Hellman Ephemeral Key
27
ECDHE
Elliptic Curve Diffie-Hellman Ephemeral Key
28
DH and related methods allow
perfect forward-secrecy
29
CA
Certificate Authority
30
CSR
Certificate Signing Request
31
CRL
Certificate Revocation List
32
OCSP
Online Certificate Status Protocol
33
OCSP vs CRL
OCSP is a CRL that works automatically over HTTP
34
Cryptographic hash functions
Based on a block cipher
35
RA
Registration Authority, for requesting certificates
36
The set of all possible permutations of a key is the
keyspace
37
Transposition cipher
Characters are rearranged, can be extremely complex
38
The only type of stream cipher covered in the exam is
RC4, used in WEP and used to be used in SSL/TLS
39
ECC
Elliptic curve cryptography
40
IVs vs Nonces
Nonces need not be random