Module 16: Basic Integrity and Authenticity Flashcards

1
Q

Four elements of Secure comminication

A

Data Integrity
Origin authentication
Data Confidentiality
Data Non-Repudiation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is a Cryptographic Hash Function

A

hashing is a one way mathematical function that is easy to compute but hard to reverse - takes a variable block of data and produces a fixed length hash

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What threat is hashing vulnerable to?

A

Man in the Middle Attacks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is a HMAC

A

a Authenticated Hash

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What does a HMAC provide?

A

authentication for the hash

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is Key Length

A

the size of the key in bits

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is Keyspace

A

the number of possibilities that can be generated by a key

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is used to provide confidentiality

A

AES and 3DES

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is a Stream Cipher

A

Encrypts plaintext one byte at a time - faster then a block cipher

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is a Block Cipher

A

Transforms a fixed length block of plaintext into ciphertext

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Asymmetric Encryption examples

A
IKE
TLS
SSH
PGP
DHKE
How well did you know this?
1
Not at all
2
3
4
5
Perfectly