Remember This Flashcards

Cryptography and PKI

1
Q

Hashing

A

Hashing verifies integrity for data such as email downloaded files and files stored on a disk . A hash is a number created w/ a hashing algorithm, and is sometimes listed as a check sum

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Two popular hashing algorithms used to verify integrity

A

Two popular hashing algorithms used to verify integrity are MD5 and SHA

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

HMAC ( Hash-based Message Authentication Code )

A

HMAC Verifies both integrity and authenticity of a message yes of shared secret

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Remember this

A

Hashing is one way function that creates a string of characters. You cannot reverse the hash to re create the original file. Passwords are often stored as hashes instead of storing the actual password additionally applications often salt passwords with extra characters before hashing them

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Remember this

A

Bcrypt & PBKDF2 stretching techniques that help prevent brute force and rainbow table attacks. Both salt the password with additional random bits

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Do hashing algorithms encrypt

A

No hashing algorithms like MD5 SHA & HMAC dont encrypt

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Remember this

A

Encryption provides confidentiality and helps ensure that data is viewable only by authorized users. This applies to any data at rest ( such as data stored in a database ) in transit being sent over a network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Steam vs block ciphers

A

Steam ciphers encrypt data a single bit or a single byte at a time in a stream. Block ciphers encrypt data in specific sizes blocks such as 64 bit or 128 bit blocks. Stream ciphers are more efficient than block ciphers when encrypting data in continuous stream

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

ECB

A

Weakest

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

CBC( Cipher Block Chaining )

A

Used by some symmetric block ciphers.

USES IV for randomization

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Cipher Modes

A

ECB deprecated should not be used. CBC mode combines each block with the previous block when encrypting data and sometimes stuffers from pipeline delays. CTM mode com bbn ones IV with a counter to encrypt each block. GCM combines Counter mode with hashing techniques for integrity.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly