Sec 701 - Encryption Flashcards
RA
Registration Authority - Accepts registration requests & authenticates the entity that makes a request.
PBKDF2
Password-Based Key Derivation Function 2 - Key stretching algorithm used for protecting passwords
HMAC
Hash Message Authentication Code - Combines cryptographic hash function with a secret key.
IaC
Infrastructure as Code - Manages infrastructure resources through scripts & templates
CRC
Cyclic Redundancy Checks - Hash function used for error checking
DSA
Digital Signature Algorithm - Creates & verifies digital signatures, not suited for encryption.
RSA
One of the oldest & widely used public key encryption
VLSM
Variable Length Subnet Mask - Networking technique that divides an IP range into subnets with different subnet masks.
ECDSA
Used for IoT, no native encryption and used for digital signatures. Derived from Elliptical Curve Cryptography
TACACS
Networking protocol Uses TCP for reliable communication & encrypts ENTIRE payload. Is AAA compliant.
Terminal Access Controller Access Control System
SAE
802.11 network standard compliant, used with WPA3 personal. Hash of a generated key unique to each authentication to the network.
PKCS
Public-key Cryptography Standards - Standards for cryptography that provide guidelines and APIs for cryptography.
IaM
Identity Access Management - User access control to specific network segments & resources based on roles & permissions
Symmetric Ciphers
AES, DES, IDEA, RC4
Asymmetric Ciphers
DHE, ECC, RSA