Obfuscation, Hashing & Digital Signatures, Blockchain Tech, Certificates Flashcards
Obfuscation
Process of hiding info in plain sight
Steganography
Hiding info inside of an image
Common steganography techniques include-
- Network based
- Image
- Invisible watermarks
- Audio
- Video
Tokenization, where is it common?
Replaces sensitive data w/ a non-sensitive place holder.
-SSN 266-12-1112 is now 691-61-8539
-Common w/ CC processing
Data obfuscation
Hide some of original data
Ex: Receipt only showing last 4 digits of bank card.
Data masking
protects sensitive info by replacing it with fake or randomized data
Hash, what’s it used for?
Represents data as a short string of text.
Used to store passwords, verifies a downloaded document is same as original.
Collision
Different input should never create the same hash
Salt
Random data added to a password when hashing
Advantages of salted hashes:
-Rainbow tables wont work
-Slows down brute force process
Advantages of blockchain”
Keeps track of transactions.
And are verified by multiple computers on the network before it is added to the blockchain ledger.
In blockchain, if changes occur then-
Those changes are distributed to everyone
Public key certificate
verifies the identity of a user or device by linking their public key to their identity
What adds ‘trust’ to digital certificates?
Digital signature
PKI uses ____________ for additional trust
Certificate Authorities
Root of trust
Inherently trusted component
-Hardware, software, firmware , or other component.
Third party certificate authorities
CA is responsible for the validation of certificate requests, issuing certificates, revocation.
Certificate signing requests (CSR)
- A key pair is created
2, Public key is sent to CA to be signed - CA validates request
- CA digitally signs cert
Private certificate authorities
You are your own CA
Self-signed certificates
Issue your own certificates signed by your own CA
Wildcard certificates
Allows a certificate to support many different domains.
Ex: .example.com can secure www.example.com, mail.example.com, and blog.example.com.
Key revocation
invalidates a cryptographic key, making it unusable for encryption or decryption
Maintained by Certificate Revocation List (CRL)
OCSP (Online Certificate Status Protocol) stapling
allows a web server to check the revocation status of a digital cert