PKI, Encrypting data, Key exchange, Encryption technologies Flashcards
PKI
Used as an associate with digital certificate to people or devices.
Asymmetric encryption, also referred to as?
Encrypt & decrypt w/ the same key.
Shared secret, secret key algorithm.
Asymmetric encryption
Encrypting & decrypting w/ two different keys.
Private key
Keep this private, no one else has access.
**Only key that can decrypt data encrypted w/ the public key
Public key
Anyone can see this key
Key escrow
Allows authorized parties to access the encryption keys.
Database encryption
Protecting stored data by converting it into an unreadable format.
Transparent encryption
Encrypt all database info w/ a symmetric key
Record-level encryption
Encrypting individual columns.
Use separate symmetric keys for each column.
Transport encryption
Protects data traversing the network
VPN
Encrypts all data over the network and hiding a user’s IP address.
Client based VPN uses-
SSL/TLS
Site-to site VPN uses-
IPsec
Key stretching
Make a weak key stronger by performing multiple processes.
*Hash a password. Hash the hash of the password. And continue.
Out-of-band key exchange
Don’t send the symmetric key over the ‘net
-Telephone, courier, in person.