PKI Flashcards

1
Q

Digest Algorithm

A

The hash function used to verify the integrity of the message/input to ensure that it has not been tampered.

e.g., SHA, MD5, Blake2

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

SHA1, SHA256, SHA-3

A

Hash functions used to verify data integrity. SHA256 is used in common applications such as TLS/SSL

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

RSA-SHA

A

Combination of an asymmetric encryption algorithm and a hash function used in digital signature creation.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Encryption algorithm

A

A symmetric or asymmetrical function to ensure the confidentiality of data being transmitted. This ensures that only the intended parties can read the information.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

RSA

A

Asymmetric encryption algorithm that has both parties use a private+public key pair exchange during session setup.

Often used with AES during TLS/SSL sessions.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

AES

A

Encryption algorithm that supports up to 256bit keys. Efficient speed-wise while maintaining security (especially when 256 bit is used).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Diffie-Hellman (DH)

A

Key exchange process in which two parties agree to generate a shared secret without sharing the actual key over the network. This is done by both parties agreeing on a mathematical function to use and then using the key pairs to compute the shared secret on their own.

DH helps with forward secrecy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

DH Group

A

Used during key exchange to determine the parameters for establishing a shared secret

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q
A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly