Sec 701 - Encryption Flashcards
RA
Registration Authority - Accepts registration requests & authenticates the entity that makes a request.
PBKDF2
Password-Based Key Derivation Function 2 - Key stretching algorithm used for protecting passwords
HMAC
Hash Message Authentication Code - Combines cryptographic hash function with a secret key.
IaC
Infrastructure as Code - Manages infrastructure resources through scripts & templates
CRC
Cyclic Redundancy Checks - Hash function used for error checking
DSA
Digital Signature Algorithm - Creates & verifies digital signatures, not suited for encryption.
RSA
One of the oldest & widely used public key encryption
VLSM
Variable Length Subnet Mask - Networking technique that divides an IP range into subnets with different subnet masks.
ECDSA
Used for IoT, no native encryption and used for digital signatures. Derived from Elliptical Curve Cryptography
TACACS
Networking protocol Uses TCP for reliable communication & encrypts ENTIRE payload. Is AAA compliant.
Terminal Access Controller Access Control System
SAE
802.11 network standard compliant, used with WPA3 personal. Hash of a generated key unique to each authentication to the network.
PKCS
Public-key Cryptography Standards - Standards for cryptography that provide guidelines and APIs for cryptography.
IaM
Identity Access Management - User access control to specific network segments & resources based on roles & permissions
Symmetric Ciphers
AES, DES, IDEA, RC4
Asymmetric Ciphers
DHE, ECC, RSA
KEK
Key-Encryption-Key - Used in key management systems to add an extra layer of security when encrypting and decrypting
PFS
Perfect Forward Secrecy - Strengthen security of session keys & encrypt/decrypt automatically
IKE
Internet Key Exchange - Set up secure connections & exchange cryptographic keys in IPsec VPNs
PSK
Pre-Shared Key - A secret key that has been established between the parties who are authorized to use it by means of some secure method
RC4
Legacy stream cipher used in WEP
Stream Cipher
Each plaintext digit is encrypted one at a time
DES
Data Encryption Standard - Legacy symmetric-key block cipher. Influential but no longer used.
TGT
Ticket Granting Ticket (Kerberos) - Secure token granted to a user after initial login, do not need to re-enter credentials every time they use a service.
GCM
Combines Cyber Threat Monitoring (CTM) for encryption with an authentication mechanism to ensure both data confidentiality and integrity
IDEA
Form of symmetric key block cipher, REPLACED by AES
AES
Advanced Encryption Standard - Symmetric block cipher chosen by the US Govt. Replaces DES & IDEA
CFB
Cipher Feedback - Transforms a block cipher into a stream cipher, enables encryption of individual bits or bytes
CBC
Cipher Block Chaining - Chains cipher blocks together, each cipher text block depends on the previous block.
ECB
Simple mode of operation with a block cipher, used with symmetric key encryption