Keys Flashcards

1
Q

What are algorithms?

A

They are mathematical procedures that help define how to encrypt information and are publicly known

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What are keys?

A

They are generated by the algorithm, they’re used for encrypting and decrypting. It makes the encryptions unique and above all they need to be secured

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

what are the common key length?

A

longer is definately harder to break but have resource intensive. Shorter is easier to break and they require less resources.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

how to key exchange?

A

Securely transmit the key. Endpoints negotiate types: types - PSK, Diffe hellman, rsa.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is key stretching?

A

Its more like key strengthening, increase the password hash size, insert random characters, and increase resiliency to brute -brute force attacks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What are the different types of key stretching?

A

There is BCRYPT: this operates on the blowfish ciphers PBKDF2 is a password based.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What was Diffie-Hellman?

A

Invented in the 70’s, secure generate a master key, and are resilient to MiTMs.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Different DH variants?

A

There is DHE and requires more processing power, and ECDHE uses less processing power with a rotating key

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What are the differnt DH groups?

A

the higher the group number the stronger the encryption

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Key management

A

managing cryptographic keys. the different activites like generation, the exchange, and the usage, storage, renewal, archival, and deletion

How well did you know this?
1
Not at all
2
3
4
5
Perfectly