Encryption and keys Flashcards

1
Q

how many keys does private key encryption use?

A

1

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

how many keys does public key encryption use?

A

2

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

how many keys does Kerberos user authentication use?

A

3

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

what port is HTTPS

A

440

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What do you need to get the “s” in HTTPS?

A

A Secure Socket Layer (SSL) certificate.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

How do you get an SSL certificate?

A

By asking the Certification Authority to hand you one, they then check your public key, and check your encryption and other facts about your website.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

An SSL certificate is useful for three points, what are they?

A

They:
show that your website’s encryption is good,
show that the website is genuine
Allow the S in HTTPS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

what are the basics of private key encryption?

A

There is 1 key, shared by the sender and the receiver, the sender uses that key to encrypt, then the receiver uses the same key to decrypt.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Disadvantage of using private key encryption?

A

You need to be able to send the key over safely, which is hard using this method, and if the key is compromised, they can read both parties’ conversations.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

what are the 2 ciphers for private key encryption?

A
Block cypher (in chunks of 64,128,256 bits)
stream cypher (bit by bit)
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

name some user authentication methods:

A
setting strong passwords
graphical passwords
biometrics
security tokens
2 step authentication (2 factor authentication)
knowledge based
certificate based
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

basics of public key encryption?

A

2 keys, one known by everyone, one private to you.
encrypt with private and the recipient’s public.
they decrypt using their private and your public.

can verify it was from a legitimate source.
very hard to eavesdrop.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What are the 3 steps of Kerberos?

A

3 keys,
Username is hashed by pass,
auth. server does the same and check to see if it matches, sends key to TGS and user, along with a TGT.

User sends the TGT along with key to the TGS, TGS verifies the key and grants user a token (that states how long they can access etc) and a key, a key is also sent to the file server.

User gives token and key to file server, file server authenticates the key and allows access according to the token’s details.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

difference between IPV4 and IPV6?

A

IPV4 contains 32 bits, and just binary, separated by “.” holding 4 billion devices.

IPV6 contains 128 bits, binary and hexadecimal and separated by a “:” holding 340 Undecillion combinations (340 trillion trillion trillion)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly