PKI Flashcards

1
Q

What are the functions of RSA?

A
  1. Choose 2 large prime numbers… P & Q
  2. Multiply them… N=P*Q
  3. Select number (E) where E is less than N and is roughly prime
  4. Find number D where D=(ED-1) mod (P-1)(Q-1)=0
  5. Distribute E & N as public key and D as private key
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is Merkle-Hellman Knapsack?

A

Early asymmetric method similar to RSA but used super-increasing sets. Broken in 1984.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is El Gamal?

A

Implementation of Diffie-Hellman algorithm. (I mod)… (You mod). Strength was that it was public domain. Weakness was that it doubled message length.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is Elliptic Curve?

A

Logarithmic function that allowed much smaller key length (160bits) than RSA (1088 bits).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What must a hash function perform?

A
  1. Input is any length.
  2. Output is fixed.
  3. Hash function is easy to perform.
  4. Has function is one way (ie cannot be reverse engineered)
  5. Collision free (no dupes)
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is the digest and block size for SHA-1?

A

160 bit digest and 512bit block.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is the digest and block for the 4 modes of SHA-2?

A
  1. .. 256 digest, 512 block
  2. .. 224 digest, 512 block
  3. .. 512 digest, 1024 block
  4. .. 384 digest, 1024 block
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Is SHA-2 considered secure?

A

Yes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is the digest and block size for MD4?

A

128 bit digest and 512bit block with 3 rounds of processing.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is the difference between MD4 & MD5?

A

MD5 uses 4 rounds of processing.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What are the distinct goals of digital signatures?

A
  1. Non repudiation.

2. Messages are not altered during transit.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What 2 functions do digital signatures implement?

A
  1. Public key crypto

2. Hashing functions

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is HMAC?

A

Hashed Message Authentication Code… Does not implement non-repudiation.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is the golden rule on which key to use?

A

When I am doing functions on myself (decrypt, sign) use my private key

When I want to deal with others (send, verify) use the other parties public key

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What must a digital cert contain?

A
  1. Cert version
  2. Serial number from CA
  3. CA signature algorithm ID
  4. CA info
  5. Subjects name
  6. public key
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What are some well known CA?

A
VeriSign
Godaddy
Geotrust
Entrust
Digicert
17
Q

What is an RA?

A

Registration Authority will work with CA to verify subject.

18
Q

What steps should you perform when presented with a digital cert?

A
  1. Determine if CA is trusted.

2. Verify cert is not on Certificate Revocation List (CRL)

19
Q

Outline the technologies and implementations of PGP…

A

Commercial - IDEA (encryption) MD5 (digest)

Freeware - CAST (encrypt), SHA-1 (digest)

20
Q

Who uses S/MIME?

A

Outlook/ Exchange
Mozilla
Max OSx

21
Q

How does SSL go about its connection process?

A
  1. Initial connection utilizes the digital cert on webserver to determine identity.
  2. Browser creates a random symmetric key that is encrypted with server’s public key
  3. Server uses symmetric key for all future communication.
22
Q

What is Steganography and when is it best used?

A

Hiding a message inside a large objects (bmp). Also used in watermarking. Does not impact the quality of the image.

23
Q

What is Link encryption?

A

Low level encryption method. lower level of OSI… End to end

24
Q

What is end-to-end encryption and how is it different than link encryption?

A

Operates at a higher level of OSI stack.

25
Q

What makes WPA better than WEP?

A

WPA implement TKIP (temporal keys).

WPA2 implements AES encryption.

26
Q
In RSA encryption, which value will always be the largest?
A. e
B. n
C. p
D. q
A

B. n = P * Q

27
Q
If Richard wants to send an encrypted message to Sue using a public key systems, which key does he use?
A. Richards public key
B. Richards private key
C. Sue's public key
D. Sue's private key
A

C. Sue’s public key

28
Q
ACME Widgets uses a 1024 RSA encryption standard and plans to convert to Elliptic Curve.  What key length needs to be chosen to maintain strength?
A. 160
B. 512
C. 1024
D. 2048
A

A. 160

29
Q
John wants to produce a message that is 2048 bytes to Mary using SHA-1.  What size will the digest be?
A. 160bits
B. 512bits
C. 1024 bits
D. 2048 bits
A

A. 160 bits

30
Q
What crypto system provide the encryption service for PGP's commercial version?
A. ROT13
B. IDEA
C.ECC
D. El Gamal
A

B. IDEA