Encryption Flashcards
HMAC
Creates a Message Authentication Code used for auth and integrity checking
HOTP
HMAC-based OTP
TOTP
Type of HOTP
PAP
For logging into network resources, clear text.
CHAP
Hash handshake-based authentication for network resources.
In-band
Key exchange as part of a communication session
Out-of-band
Key exchange outside of the main data communication channel, like phone, internet or physically.
PSK
Preshared key. Symmetrical encryption key that is shared beforehand, out-of-band.
Session key
Random private key generated in-band.
Stream cipher
Encryption is done per-bit.
Block cipher
Encryption is done on blocks of data at a time.
Perfect forward secrecy
Creation of a random public key that is session ephemeral, preventing future decryption by compromised keys.
RIPEMD
Hashing function based on RACE.
NTLMv2
NT LAN Manager, hashing process for storing password in the windows registry. Uses HMAC-MD5
Key stretching
Algorithm for increasing the complexity of a key.
Key stretching algorithms
PBKDF2 and bcrypt
DES
old DoD block cipher
3DES
old, but slightly better DoD block cipher
RC
Rivest Cipher, family of cryptographic methods
RC examples
RC4 (stream cipher, used in SSL and WEP) and RC5 (block cipher)
Blowfish
Symmetrical encryption made as a replacement for DES. Succeeded by Twofish.
AES
Symmetric encryption standard made by NIST. Block cipher with variable key length.
Examples of asymmetrical ciphers
RSA and Elliptic-curve
RSA
Asymmetrical encryption, Rivest-Shamir-Adleman.
DH
Diffie Hellman key exchange method
DHE
Diffie Hellman Ephemeral Key
ECDHE
Elliptic Curve Diffie-Hellman Ephemeral Key
DH and related methods allow
perfect forward-secrecy
CA
Certificate Authority
CSR
Certificate Signing Request
CRL
Certificate Revocation List
OCSP
Online Certificate Status Protocol
OCSP vs CRL
OCSP is a CRL that works automatically over HTTP
Cryptographic hash functions
Based on a block cipher
RA
Registration Authority, for requesting certificates
The set of all possible permutations of a key is the
keyspace
Transposition cipher
Characters are rearranged, can be extremely complex
The only type of stream cipher covered in the exam is
RC4, used in WEP and used to be used in SSL/TLS
ECC
Elliptic curve cryptography
IVs vs Nonces
Nonces need not be random