Keys Flashcards

1
Q

What are Keys?

A

A string of characters used within an encryption algorithm for altering data so that it appears random.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What are the pros and cons of longer keys?

A

Pro: Harder to break
Con: Resource intensive

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What are the pros and cons of shorter keys?

A

Pro: Easier to break
Con: Less resource requirements

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What are three types of keys?

A

1) PSK (Pre-shared key)
2) RSA
3) Diffie-Hellman

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is key stretching?

A

Techniques that are used to make a possibly weak key, typically a password or passphrase, more secure against a brute-force attack by increasing the resources (time and possibly space) it takes to test each possible key.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What are some examples of key stretching?

A

1) Increase the password hash size
2) Inserting random characters

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What are two types of key stretching?

A

1) BCRYPT
2) PBKDF2

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is the Diffie-Hellman key exchange?

A

A key exchange that was invented in the 70’s that was resilient to MiTM attacks.

Included DH Groups where the higher the group number the stronger it was.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What are some variants of Diffie Hellman?

A

1) DHE (Diffie-Hellman Ephemeral)
2) ECDHE (Elliptic Curve Diffie-Hellman Ephemeral)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

List the key management activities in order.

A

1) Generation
2) Exchange
3) Usage
4) Storage
5) Renewal
6) Archival
7) Recovery
- Key Recovery Agent (KRA)
8) Destruction

How well did you know this?
1
Not at all
2
3
4
5
Perfectly