Introduction to Cryptography Flashcards
Which key is used to sign the certificate issued to businesses by a CA?
Private key of the root CA
What is a CA?
a trusted third party that signs digital certificates using its private key
Which key do businesses send to customers to prove its identity?
Public key of the company
What should an administrator use to import and export all items written using X.509 that are part of a chain of trust?
Public Key Cryptography Standard (PKCS) #12
What is Public Key Cryptography Standard (PKCS) #12?
PKCS #12 defines an archive file format for storing many cryptography objects as a single file. It is commonly used to bundle a private key with its X.509 certificate or to bundle all the members of a chain of trust.
What is Public Key Cryptography Standard (PKCS) #7?
used for generation and verification of digital signatures and certificates managed by a PKI (Public Key Infrastructure). This standard served as the basis for the S/MIME (Secure/Multipurpose Internet Mail Extensions) standard.
Is AES symmetric or asymmetric?
symmetric
Which two components involved in performing encryption are known to the party that will perform decryption before symmetric encryption is applied?
Cryptographic algorithm
Cryptographic key
Employee A created a secret key and wants to send it to Employee B without any coworkers being able to decrypt the message.
Which key needs to encrypt the message?
Employee B’s public key
What is ECB and what does it do?
A block cipher mode that encrypts each group with the same key, leaving each group independent of the others.
What is a Nonce value?
What can it prevent?
An arbitrary number that can be used just once in a cryptographic communication.
It is often a random or pseudo-random number issued in an authentication protocol to ensure that old communications cannot be reused in replay attacks.
They can also be useful as initialization vectors and in cryptographic hash functions. .
What is an Initialization vector used for?
What two block cipher modes have it?
It is a type of salt that adds extra random data to prevent duplicate output for the same input byte.
Used for ECB, and the first block of CBC.
What is CTR and what does it do?
A block cipher mode that
What is GCM and what does it do?
Incremental symmetric block cipher mode with authentication, has good performance
What is a XOR?
exclusive OR; if two input bits are identical, output is 0. If input is different, output is a 1.
What is CBC and what does it do?
A block cipher mode that is popular and easy to implement.
Each block is XORed. Very first block uses IV instead of XOR.
What is CTR and what does it do?
A block cipher mode that uses an incremental counter (CTR) for randomization, can behave like a stream cipher.
Applies the XOR to the plaintext, and increments a counter for the next block.
What is GCM and what does it do?
Block cipher mode that combines CTR mode with Galois authentication.
Very efficient with low overhead, used for packetized data such as wireless, IPsec, SSH, TLS.
What two block modes use XOR and how do they do it differently?
CBC XORs by comparing each block to the previous block, very first requires an IV instead.
CTR applies XOR to the plaintext instead and increments the counter for the next block.