GCGA Ch. 10 Understanding Cryptography and PKI Flashcards

1
Q
A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q
A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Integrity

A

provides assurances that data has not been modified. Hashing ensures that data has retained integrity. Confidentiality ensures that data is only viewable by authorized users. Encryption protects the confidentiality of data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Symmetric encryption

A

uses the same key to encrypt and decrypt data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Asymmetric encryption

A

uses two keys (public and private) created as a matched pair.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Digital signature

A

provides authentication, non-repudiation, and integrity. Users sign emails with a digital signature, which is a hash of an email message encrypted with the sender’s private key. Only the sender’s public key can decrypt the digital signature which reveals hash, providing verification the hash was encrypted with the sender’s private key.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Authentication

A

validates an identity.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Non-repudiation

A

prevents a party from denying an action.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Hashing & Hashes

A

Hashing verifies the integrity of data, such as downloaded files and email messages. A hash is a fixed-length string of hexadecimal characters, which cannot be reversed to re-create the original data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Checksum

A

similar to a hash but is typically smaller. It is used to verify the integrity of data but is not intended to be cryptographically secure.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Hashing algorithms

A

one-way functions used to create a hash. You cannot reverse the process to re-create the original data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Hash collision

A

occurs when a hashing algorithm creates the same hash from different inputs.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Common hashing algorithms

A

Message Digest 5 (MD5), Secure Hash Algorithms (SHA), and Hash-based Message Authentication Code (HMAC). HMAC provides both integrity and authenticity of a message.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Password attacks

A

attempt to discover passwords. An online password attack attempts to discover a password from an online system. An offline password attack attempts to discover passwords from a captured database or captured packet scan. Passwords are often stored as a hash. Weak hashing algorithms are susceptible to collisions, which allow different passwords to create the same hash.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Brute force attack

A

attempts to guess all possible character combinations. Account lockout policies thwart online brute force attacks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Dictionary attack

A

uses all the words and character combinations stored in a file. Complex passwords thwart offline password attacks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Spraying attack

A

attempts to bypass account lockout policies. An automated program starts with a large list of targeted user accounts. It then picks a password and tries it against every account in the list. It then picks another password and loops through the list again.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Pass the hash attack

A

In a pass the hash attack, the attacker discovers the hash of the user’s password and then uses it to log on to the system as the user.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Birthday attack

A

an attacker attempts to create a password that produces the same hash as the user’s actual password.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Password salting

A

adds additional characters to passwords before hashing them and prevents many types of attacks, including dictionary, brute force, and rainbow table attacks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Key stretching techniques

A

Three commonly used key stretching techniques are bcrypt, Password-Based Key Derivation Function 2 (PBKDF2), and Argon2. They protect passwords against brute force and rainbow table attacks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

Confidentiality

A

ensures that data is only viewable by authorized users. Encryption provides confidentiality of data, including data at rest (any type of data stored on disk) or data in transit (any type of transmitted data).

23
Q

Block cipher

A

encrypt data in fixed-size blocks. Advanced Encryption Standard (AES) encrypts data in 128-bit blocks and 3DES encrypts data in 64-bit blocks.

24
Q

Stream ciphers

A

encrypt data 1 bit or 1 byte at a time. They are more efficient than block ciphers when encrypting data of an unknown size or when sent in a continuous stream. Asymmetric encryption uses public and private keys as matched pairs.

25
Public & Private Keys
If the public key encrypts information, only the matching private key can decrypt it. If the private key encrypts information, only the matching public key can decrypt it. Private keys are always kept private and never shared. Public keys are freely shared by embedding them in a certificate.
26
Asymmetric encryption (2)
used to share symmetric keys between two entities. After both parties know the symmetric key, they use it to encrypt data within the session because symmetric encryption is much faster than asymmetric encryption.
27
Certificates
distribute public keys and the same public key is used for months or years.
28
Ephemeral keys
last only a short time, such as a few minutes within a session. Perfect forward secrecy ensures that the compromise of a key does not compromise any keys used in the past. It depends on the use of ephemeral keys.
29
ECC
Elliptic curve cryptography - an encryption technology that doesn’t take as much processing power as other cryptographic methods. It is commonly used with low power devices.
30
Common obfuscation techniques
include steganography, tokenization, and masking.
31
Steganography
the practice of hiding data within a file. Current steganography methods include audio steganography, image steganography, and video steganography.
32
Tokenization
replaces sensitive data with non-sensitive tokens, retaining essential information without revealing sensitive details, commonly used in payment processing and securing personally identifiable information.
33
Masking
partially or fully conceals sensitive data with characters, symbols, or other data, often employed when sharing data with third parties or for development and testing purposes.
34
Encryption/decryption of emails using digital signatures
When using digital signatures with email: The sender’s private key encrypts (or signs). The sender’s public key decrypts. A digital signature provides authentication (verified identification) of the sender, non-repudiation, and integrity of the message.
35
Sending email & digital signatures
Senders create a digital signature by hashing a message and encrypting the hash with the sender’s private key. Recipients decrypt the digital signature with the sender’s matching public key. When encrypting email: The recipient’s public key encrypts. The recipient’s private key decrypts. Many email applications use the public key to encrypt a symmetric key, and then use the symmetric key to encrypt the email contents.
36
S/MIME
used to secure email with encryption and digital signatures. It uses certificates and depends on a PKI. When deploying, use port 587 for SMTP-over-TLS and port 993 for IMAP-over-TLS.
37
Encrypting traffic & TLS
When encrypting website traffic with TLS: The website’s public key encrypts a symmetric key. The website’s private key decrypts the symmetric key. The symmetric key encrypts data in the session.
38
PKI
A Public Key Infrastructure (PKI) is a group of technologies used to request, create, manage, store, distribute, and revoke digital certificates. A PKI allows two entities to privately share symmetric keys without any prior communication.
39
Public CAs
Most public CAs use a hierarchical centralized CA trust model, with a root CA and intermediate CAs. A CA issues, manages, validates, and revokes certificates. Certificate chaining combines all the certificates from the root CA to the certificates issued to the end-entities.
40
CSR
You request a certificate with a certificate signing request (CSR). You first create a private/public key pair and include the public key in the CSR.
41
Online/Root CAs
An online CA is accessible over a network, including the Internet. Many root CAs are taken offline to reduce the risk of compromise.
42
Updating/revoking certificates
Configuration changes related to certificates are updating them and revoking them. Certificates are renewed before their expiration dates to update them. Certificates are revoked if they are compromised.
43
CRL
A certificate revocation list (CRL) identifies revoked certificates with a list of serial numbers. The CA publishes the CRL, making it available to anyone. Web browsers can check certificates they receive from a web server against a copy of the CRL to determine if a certificate is revoked.
44
OCSP
As an alternative to the CRL, the Online Certificate Status Protocol (OCSP) allows clients to query the CA with the serial number of the certificate to determine if it is valid.
45
Certificate stapling
provides clients with a timestamped, digitally signed OCSP response. This is from the CA and appended to the certificate.
46
Certificate pinning
provides clients with a list of hashes for each public key it uses.
47
Key escrow
stores a copy of private keys used within a PKI. If the original private key is lost or inaccessible, the copy is retrieved from escrow, preventing data loss.
48
Wildcard certificates
use an asterisk (*) for sub domains to reduce the administrative burden of managing certificates.
49
SAN
Subject alternative name (SAN) certificates can be used for multiple domains with different domain names.
50
CER & DER
CER is an ASCII format and DER is a binary format for certificates.
51
PEM
the most commonly used certificate format and can be used for just about any certificate type.
52
P7B files
commonly used to share public keys.
53