Hash Functions, Authentication, & Block Chain Flashcards

1
Q

A widely used asymmetric encryption algorithm that uses two keys: a public key for encryption and a private key for decryption. It’s commonly used in secure communications, such as email and digital signatures.

Example: Encrypting a message with the recipient’s public key and decrypting it with their private key.

A

RSA - Rivest-Shamir-Adleman

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

A symmetric encryption algorithm used to secure data by converting plaintext into ciphertext using a secret key. AES is widely used for encrypting sensitive data, offering different key lengths (128, 192, and 256 bits).

Example: Encrypting files on a hard drive to protect sensitive information.

A

AES - Advanced Encryption Standard

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

A set of standards developed to promote the use of public-key cryptography for secure communication and data protection. PKCS defines formats and protocols for digital signatures, encryption, and certificate management.

A

PKCS - Public Key Cryptography Standards

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

A family of cryptographic hash functions designed to produce a fixed-size hash value from an input of any size. It’s used for ensuring data integrity and is a key component in digital signatures and certificates.

A

SHA - Secure Hash Algorithm

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

A widely used cryptographic hash function that produces a 128-bit hash value. It’s commonly used for data integrity checks but is now considered insecure due to vulnerabilities to collision attacks.

Example: Checking the integrity of a downloaded file by comparing its hash to the expected value.

A

MD5 - Message Digest Algorithm 5

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

The latest member of the SHA family, designed to provide a higher level of security and resistance to vulnerabilities such as collision attacks. It uses a different cryptographic structure (Keccak) compared to earlier SHA versions.

Example: Using this to hash a password for secure storage with better collision resistance.

A

SHA-3 - Secure Hash Algorithm 3

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

A cryptographic hash function designed to produce a 160-bit hash value. It’s less commonly used than SHA but provides a reliable option for ensuring data integrity.

A

RIPEMD-160 - RACE Integrity Primitives Evaluation Message Digest 160-bit

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

A construction for creating a message authentication code (MAC) using a cryptographic hash function and a secret key. It ensures data integrity and authenticity by verifying that the data has not been tampered with and is from a trusted source.

A

HMAC - Hash-based Message Authentication Code

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

A hash function used to detect errors in data. It generates a short, fixed-size checksum from a data set, which is then used to check for accidental changes or corruption during transmission or storage.

A

CRC - Cyclic Redundancy Check

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

A random value added to passwords before hashing to ensure that identical passwords generate different hash values. It protects against rainbow table attacks and helps secure stored passwords.

A

Salt

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

A starting value used in cryptographic algorithms, particularly in pseudo-random number generators (PRNGs), to produce unpredictable results. The seed ensures that the sequence of random numbers can be reproduced if needed.

A

Seed

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

A secret value added to a password before hashing, similar to salt, but it is kept private and not stored alongside the hashed password. Peppering provides an additional layer of security to protect against attacks like brute force and dictionary attacks.

A

Pepper

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

A random or pseudorandom value used in cryptography to ensure that the same plaintext input does not always produce the same ciphertext when encrypted with the same key. It adds unpredictability to the encryption process.

A

IV - Initialization Vector

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

A technique used to make a weak key more secure by increasing its length or complexity through repeated hashing or encryption. It helps protect against brute force attacks by slowing down the key derivation process.

A

Key Stretching

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

A cryptographic method used to verify the authenticity and integrity of a message or document. It uses asymmetric encryption where the sender signs the data with their private key, and the recipient can verify it using the sender’s public key.

A

Digital Signature

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

A widely used asymmetric algorithm for creating digital signatures, which ensures the authenticity and integrity of a message or document. It is often used in secure communications and digital certificates.

Example: Signing software packages to confirm their origin and ensure they haven’t been tampered with.

A

DSA - Digital Signature Algorithm

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

A digital document issued by a trusted Certificate Authority (CA) that binds a public key to an entity’s identity, allowing others to verify the identity of the certificate holder. It is used in public key infrastructure (PKI) for secure communications.

A

Digital Certificate

18
Q

An asymmetric cryptographic algorithm that uses elliptic curve mathematics to create digital signatures. It offers high security with shorter key lengths compared to traditional algorithms like RSA.

Example: Used in Bitcoin and other cryptocurrencies to verify the authenticity of transactions.

A

ECDSA - Elliptic Curve Digital Signature Algorithm

19
Q

A key exchange protocol that allows two parties to securely exchange encryption keys over an insecure channel. It uses elliptic curve cryptography for faster and more secure key generation. The “ephemeral” part means the keys are temporary, enhancing security by ensuring they are discarded after use.

Example: Used in modern TLS/SSL protocols for secure communication, such as when establishing HTTPS connections.

A

ECDHE - Elliptic Curve Diffie-Hellman Ephemeral

20
Q

A widely used asymmetric encryption algorithm that uses two keys: a public key for encryption and a private key for decryption. It’s commonly used for securing communications, digital signatures, and encrypting sensitive data.

Example: Encrypting a message with the recipient’s public key and decrypting it with their private key.

A

RSA - Rivest-Shamir-Adleman

21
Q

A cryptographic algorithm used to securely derive a cryptographic key from a password. It applies multiple iterations of a hash function to the password along with a salt to make brute-force attacks more difficult.

A

PBKDF2 - Password-Based Key Derivation Function 2

22
Q

A decentralized, distributed database that is accessible by anyone and records transactions or data entries in a transparent, immutable manner. It is commonly used in cryptocurrency systems to track all transactions made.

A

Open Public Ledger

23
Q

A type of distributed ledger that stores data in “blocks,” which are linked together in a chain. Each block contains a list of transactions and is cryptographically secured, making it tamper-resistant and ideal for use in secure applications like cryptocurrencies and smart contracts.

A

Blockchain Technology

24
Q

A set of practices for IT service management (ITSM) that focuses on aligning IT services with the needs of the business. It provides a comprehensive framework for delivering IT services efficiently and effectively.

A

ITIL - Information Technology Infrastructure Library

25
Q

A series of formal documents used to specify standards, protocols, and technologies related to the internet and networking. They are published by the Internet Engineering Task Force (IETF) and help guide the development of internet technologies.

A

RFC - Request for Comments

26
Q

A set of standards developed to promote the use of public key cryptography. These standards provide specifications for various cryptographic operations, including key exchange, digital signatures, and encryption.

A

PKCS - Public Key Cryptography Standards

27
Q

A joint effort between the ISO and IEC to develop and publish international standards for a wide range of industries, including information technology, cybersecurity, and telecommunications.

A

ISO/IEC - International Organization for Standardization / International Electrotechnical Commission

28
Q

An entity responsible for accepting requests for digital certificates and authenticating the entity making the request. It works in conjunction with a Certificate Authority (CA) to issue digital certificates by verifying the identity of users before certificate issuance.

A

Registration Authority

29
Q

A unique identifier used in X.500 directories, such as in digital certificates, to specify the identity of an entity. It is composed of multiple attributes, such as Common Name (CN), Organization (O), and Country (C).

A

DN - Distinguished Name

30
Q

A trusted organization or entity responsible for issuing and managing digital certificates. The CA verifies the identity of entities and provides certificates to facilitate secure communication.

issues SSL/TLS certificates for websites, allowing secure communication between users and servers over HTTPS.

A

CA - Certificate Authority

31
Q

A software library or module that implements cryptographic algorithms and provides cryptographic services, such as encryption, decryption, and digital signing. It is used in conjunction with applications that require cryptographic functions.

A

CSP - Cryptographic Service Provider

32
Q

A list maintained by a Certificate Authority (CA) that contains digital certificates that have been revoked before their expiration date. It allows systems to check if a certificate is still valid and has not been compromised or revoked.

A

CRL - Certificate Revocation List

33
Q

A protocol used to obtain the revocation status of an X.509 digital certificate in real-time. It allows clients to query a Certificate Authority (CA) to verify whether a certificate is still valid or has been revoked. OCSP provides a more efficient method than CRLs for checking certificate validity.

A

OCSP - Online Certificate Status Protocol

34
Q

A tunneling protocol that encapsulates EAP within an encrypted and authenticated TLS tunnel, improving security during wireless network authentication, often used in WPA2 Enterprise.

A

PEAP (Protected Extensible Authentication Protocol)

35
Q

An authentication framework used in network access control to support various authentication methods, including certificates, passwords, and biometrics.

A

EAP (Extensible Authentication Protocol)

36
Q

An older EAP authentication method developed by Cisco, typically used for wireless LANs, offering authentication based on a username and password but with known security vulnerabilities.

A

LEAP (Lightweight Extensible Authentication Protocol)

37
Q

An email authentication method that uses public-key cryptography to verify that an email message was not altered in transit and that it originates from the domain it claims to come from.

A

DKIM (DomainKeys Identified Mail)

38
Q

An email validation system that allows domain owners to specify which mail servers are authorized to send emails on behalf of their domain, helping prevent email spoofing.

A

SPF (Sender Policy Framework)

39
Q

A standard for securing email communications through encryption and authentication using X.509 certificates. PEM files are often used for storing cryptographic keys and certificates.

A

PEM (Privacy-Enhanced Mail)

40
Q

An email authentication protocol that builds on SPF and DKIM, allowing domain owners to set policies for how unauthenticated emails should be handled and providing reporting capabilities.

A

DMARC (Domain-based Message Authentication, Reporting & Conformance)