Encryption Flashcards

1
Q

El gamal

A

Primarily used for transmitting digital signatures and key exchange

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

KPMS - key management practices standard

A

Is a document that describes in detail the organizational structure, responsible roles and rules for key management

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

ECC - elliptic curve crypto system

A

Similar function to RSA but with smaller key sizes (less computing power) current US government standard

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

AES - advanced encryption standard

A

128/192/256 bit key 10/12/14 rounds of substitution and transposition, replaced in 3DES standard

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

3DES- triple data encryption standard

A

64 bit/48 rounds substitution and transposition using either 2 or 3 keys - replaced by DES considered to be depreciated

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

3DES- triple data encryption standard

A

64 bit/48 rounds substitution and transposition using either 2 or 3 keys - replaced by DES considered to be depreciated

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Key

A

This is mathematical signature used for encryption data process, asymmetric had 2 keys, symmetric 1 key

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Private key

A

Key mathematically related to a public key asymmetric encryption, hold by receiver, top secret

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Encryption

A

Is commonly used to protect the confidentiality of data transit and data rest. Process
Clear text=> algorithm key => cipher text => algorithm + key=>clear text

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Rc4- rivest cipher 4

A

Stream cipher key 40-2048 bits. It encrypts messages one byte by one at a time via an algorithm. The most popular. 4 variants:
1. Spritz
2. RC4a
3. Vmcp
4. RC4a+

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Asymmetric algorithm

A

Encryption uses 2 mathematically related keys to encrypt and decrypt keys are referred to as public and private key. Public key is freely distributed.private secured keys are top secret, handled by owner.
Is computer resources intensive, key 2048 or more, scalable, designed for key exchange,
Process:
Clear text=> asymmetric. Alg. + asymmetric key |M1 Key|=> cypher text =>|M2 key| symm. Alg, +asym key=> clear text

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

RSA

A

Widely implemented de facto commercial standard.works with encryption and digital signatures. Encrypts communication between two parties over an insecure network like the internet.is used with Transport layer security (TLS) to establish secure connections between web servers and web browsers, moreover RSA aids secure email communication by providing a way to encrypt and decrypt messages.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Pubic key

A

Key mathematically connected to person private key holder, is publish and used in asymmetric encryption

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Symmetric encryption

A

Uses the ONE KEY, the same key is used to encrypt and decrypt data. The key may be referred to as a single key,shared key, secret key or session key. Is computionally efficient, key 128/192/256 bits, not scalable, inherently insecure
Process
Clear text=> symmetric key+ algorithm => ciphertext=> symmetric algorithm + symmetric key=> clear text

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

DIFFE - HELLMAN

A

Primary used for key agreement (key exchange) allows 2 parties to (in the same DH group) that have no prior knowledge of each other to jointly establish a shared secret key

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Session key

A

Is an interaction between a user and web server characterized by exchange of information. Personal X encrypts message and is sending its current timestamp using randomly generated session key

17
Q

Data at rest encryption

A

Data encrypted on a storage device, in windows you can use bitlocker,

18
Q

Transparent encryption

A

Encrypt all database information with a symmetric key

19
Q

Record level encryption

A

It encrypt individual columns, areas of data, use separate symmetric keys for each column.

20
Q

Transport encryption

A

Protecting of data traversing the network, communication on network https protocol, VPN (virtual private network) encrypts all the data transmitted over the network, regardless of the application. Client based VPN is using SSL/TLS, site-to siege VPN is using IPSec

21
Q

Encryption algorithm

A

This is a proper formula which must be used during encryption and decryption. Both sides decide on the algorithm before encrypting the data. The details are often hidden from the end user (does not see details of algorithm).

22
Q

Out of band key exchange

A

Encryption key exchanges method, where key is not send via network (telephone, courier, via person)

23
Q

In band key exchange

A

We don’t have luxury time we need to be able to encrypt a single communication immediately in our browser so we would need to use some type of band, which means some type of information is gonna be across the network. For example-to encrypt a symmetric key, send that asymmetrically encrypted key to a third-party and they can decrypt it to obtain a symmetric key.