MOD 20 - Cryptography Flashcards

1
Q

Types of ciphers:

A

Symmetric, Asymmetric, Substitution, Transposition, Stream, Block. Be familiar with each of these.

Be familiar with encryption processes, PKI, digital signatures, non-repudiation, public & private keys, certificates, CA’s, RA’s, CRL’s, etc.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Certificate Validation

A

Process of checking a certificate to ensure it’s valid and has not been revoked

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Symmetric ciphers:

A

Only one key: the same key encrypts and decrypts. MUCH faster than Asymmetric, so used for any bulk-encryption needs

The main drawback to symmetric is there is no built-in way to exchange the key with the recipient.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

RC4 (Ron’s Code 4) SYM

A

Symmetric STREAM cipher used in WEP and WPA/TKIP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

DES - Data Encryption Standard SYM

A

Uses 56-bit keys and 64-bit blocks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

2DES SYM

A

does DES twice, with 2 different keys. Susceptible to a “Meet-in-the-Middle” attack, allowing the attacker to figure out 1 of the keys.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

3DES SYM

A

does DES three times, with 3 different keys (oversimplified, but that’s the idea)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Twofish SYM

A

Uses 128 bit blocks, and up to 256 bit key size.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Threefish SYM

A

Blocks and keys can be 256, 512, and 1024 bits

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

AES - Advanced Encryption Standard SYM

A

Currently our best symmetric encryption option. Like Twofish, it uses 128 bit blocks and 128, 192, or 256 bit keys. Faster than Twofish!

AES is a block cipher and when used with WPA2 we call it CCMP (AES in CTR mode)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q
  • CAST-128 SYM
A

Symmetric block cipher that uses 64-bit blocks and does 12 or 16 rounds of encryption

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q
  • Serpent SYM
A

Symmetric block cipher that uses four 32-bit blocks, does 32 rounds of encryption, and uses key sizes of 128, 192, or 256 bits

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

IDEA (used with PGP) SYM

A

Symmetric encryption that was supposed to replace DES. Optionally used with PGP for bulk encryption once RSA handles the key-exchange. 64 bit blocks, 128 bit key.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Asymmetric ciphers:

A

Creates a Public-Private key pair. Encrypt with either one, then only the OTHER one can decrypt.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

RSA (Rivest, Shamir, Adleman) ASYM

A

First creates a private key, then mathematically deduces a public key from the private key, which is a one-way math function (can’t be reversed)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

ECC (Elliptic Curve Cryptography) ASYM

A

Can use small keys, but then get’s large-strength encryption from them. Very useful for portable devices with weaker processors.

17
Q

Hashing algorithms:

A

Can be used to see if files (any data really) have changed. Used as an INTEGRITY checking mechanism.

18
Q

MD5 (Message Digest 5) HASH ALG

A

32 (hex) character output, which is 128 bits. Prone to collisions

19
Q

SHA-1 (Secure Hashing Algorithm 1) HASH ALG

A

40 (hex) char output, 160 bits. Very similar to MD5, but more bits means less collisions.

20
Q

Collisions

A

Problem with hashing where two (or more) different source messages produce the same message digest.

Collision resistance is the ability for a hashing algorithm to produce less collisions. This typically involves a very long digest (more bits means more unique digests)

A collision attack is an attempt to find two messages that produce the same hash. While not all that practical, it does demonstrate that a particular hashing algorithm is flawed. SHA-1 and MD5 are prone to these attacks.

21
Q

Key Escrow

A

In general, NEVER give your private key to anyone! The only exception is if you want your administrator to back up your private key for safekeeping. The admin’s role is then called the Recovery Agent (or Data Recovery Agent), and she keeps your private key in a safe location we call Key Escrow.

22
Q

PGP (Pretty Good Privacy)

A

Program that can encrypt data such as e-mails. Uses RSA for symmetric-key-exchange, then IDEA for the bulk data encryption. Free for 30 days, but you have to pay after that.

23
Q

For data confidentiality, encrypt with recipients Public Key

A

Only the recipients private can decrypt

24
Q

*GPG

A

GNU Privacy Guard. Free alternative/competitor to PGP

25
Q
  • Web-of-Trust
A

Security model used by PGP/GPG/etc where each user acts as a CA and signs each other’s public keys for distribution. Every user has a “ring of public keys” (other users keys) to encrypt data and keep it confidential.

26
Q

TPM - Trusted Platform Module

A

“Crypto-chip” on your motherboard that can generate and store encryption keys. Can be used with tools like Bitlocker, which can encrypt/decrypt data on your hard disk. Microsoft’s Bitlocker tool can do disk encryption.

27
Q

DROWN attack

A

Your webserver allows inbound TLS connections using a certificate (public key) and corresponding private key. Unfortunately, your server is mis-configured and still allows SSL v2 connections. In this scenario, the very same certificate and private key are being used for both the TLS and SSL connections. The problem here is that SSL v2 has known vulnerabilities that can let an attacker get your webserver’s private key. Once he does, since your server uses the same cert for both TLS and SSL v2, the attacker can now intercept and view your incoming TLS traffic. Solution: disable SSL!!

28
Q
  • Heartbleed
A

High-profile vulnerability with the SSL protocol (from 2014) that exposed a webserver’s PRIVATE key
Allowed attacker to get web server PRIVATE KEY. SSL 3.0 was hacked.

29
Q

Cryptanalysis

A

Breaking encryption. An ADAPTIVE chosen plaintext (or ciphertext) attack allows the attacker to make many interactive queries to encrypt his/her data, then he/she is able to choose subsequent plaintexts based on the results of the previous encryption.

30
Q

Rubber-Hose attack

A

Getting someone’s encryption key through coercion or torture. Not recommended.

31
Q

*Key Stretching

A

Process of strengthening a key by making it longer

32
Q

Difference between Digital Signature and Asymmetric

A

Know these. Digital signature only proves nonrepudiation, does not provide confidentiality. Use senders private key.

For confidentiality, encrypt with recipients public

33
Q

Dual-Key-Pair

A

Encrypts header and digital signs with senders private, then encrypts the data with recipients public, decrypts with private. Receiver uses public key to decrypt hash.

34
Q

Certificate Authority

A

Vouches for a public key by signing it.

35
Q

Registration Authority

A

Verifies user is authentic. May perform background check. Like GoDaddy, Digicert

36
Q

Recovery Agent or Data Recovert Agent

A

Special Admin role tasked with backing up employee private keys.

37
Q

Key Escrow

A

Secure location for the DRA to store/back-up employee’s private keys

38
Q

Adaptive chosen plain text attack

A

Attacker makes a series of interactive queries, choosing subsequent plain texts based on the information

39
Q

DUHK Attack

A

Don’t Use Hard-Coded Keys