Module 16: Basic Integrity and Authenticity Flashcards
Four elements of Secure comminication
Data Integrity
Origin authentication
Data Confidentiality
Data Non-Repudiation
What is a Cryptographic Hash Function
hashing is a one way mathematical function that is easy to compute but hard to reverse - takes a variable block of data and produces a fixed length hash
What threat is hashing vulnerable to?
Man in the Middle Attacks
What is a HMAC
a Authenticated Hash
What does a HMAC provide?
authentication for the hash
What is Key Length
the size of the key in bits
What is Keyspace
the number of possibilities that can be generated by a key
What is used to provide confidentiality
AES and 3DES
What is a Stream Cipher
Encrypts plaintext one byte at a time - faster then a block cipher
What is a Block Cipher
Transforms a fixed length block of plaintext into ciphertext
Asymmetric Encryption examples
IKE TLS SSH PGP DHKE