Key Exchange Flashcards

Security+

1
Q

What is a logistical challenge in key exchange?

A

Sharing an encryption key across an insecure medium without physically transferring the key.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is out-of-band key exchange?

A

A method of sharing a symmetric key without sending it over the internet, using methods like telephone, courier, or in-person communication.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is in-band key exchange?

A

A method of sharing a symmetric key over the network, often protected with additional encryption or using asymmetric encryption to deliver the key.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Why is real-time encryption/decryption important?

A

There is a need for fast security without compromising the integrity of the security measures.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

How does a client share a symmetric session key with a server?

A

The client encrypts a random symmetric key with the server’s public key, allowing the server to decrypt it and use it for data encryption.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is a session key?

A

A temporary symmetric key used to encrypt data during a session, which is shared using asymmetric encryption.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Why should session keys be implemented carefully?

A

They need to be changed often (ephemeral keys) and should be unpredictable to maintain security.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

How is a symmetric key created from asymmetric keys?

A

By using public and private key cryptography, where mathematical operations are used to derive a symmetric key from asymmetric key pairs.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is the primary advantage of using asymmetric encryption in key exchange?

A

It allows secure transmission of a symmetric key over an insecure channel, ensuring confidentiality during the exchange.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What are ephemeral keys?

A

Temporary keys used for a short duration to enhance security by minimizing the risk of key compromise.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly