PKI Flashcards

1
Q

What are two alternatives to PKI?

A
  • Diffie-Helman provides a method for key exchange using a one-way function without the need of PKI (encrypting the symmetric key with the recipient’s public key) for safe key exchange.
  • Knapsack is an alternative public encryption method for creating a public key and a private key.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

standard for cryptographic syntax and encrypting messages using PKI

A

PKCS 7

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

standard for certificate signing requests

A

PKCS 10

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

standard for bundling multiple certificates together for transport

A

PKCS 12

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

These are exchanged at the start of a conversion to authenticate each device.

A

X.509v3 digital certificates which contain the public keys

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

lightweight public key along with a Diffie-Hellman related handshake between the RFID tag and the RFID reader in RFID implementations.

A

Elli

Elliptic Curve light

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is PKI?

A

the framework for issuing, distributing, storing, using, and verifying digital certificates; also used for managing public-key (AKA asymmetric) encryption

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

uses modular exponentation

A

DSA

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Used in both encryption and digital signing

A

EL Gamal

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is the difference between HMAC and a digital signature?

A
  • Digital signatures - Provides non-repudiation through PUBLIC-PRIVATE ASYMMETRIC KEYS.
  • HMAC- Providing integrity for large data transfers, using SHARED SYMMETRIC KEY.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

HMAC is created with what hash typically?

A

SHA-1, MD-5, Chaskey

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

what supports homomorphic encryption?

A

The Paillier cryptosystem

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

one-way hashing method which protects

against an adaptive chosen ciphertext attack.

A

Cramer-Shoup

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

public key method that is used in both encryption and digital signing. It is used in many applications and uses discrete logarithms.

A

El-Gamal

How well did you know this?
1
Not at all
2
3
4
5
Perfectly