Section 1.4 Flashcards
What does PKI stand for?
Public Key Infrastructure
What’s the purpose of the PKI?
Public Key Infrastructure (PKI) is a framework of policies, procedures, hardware, software, and people that enables the secure exchange of information over networks. It uses a system of digital certificates and public-private key pairs to authenticate the identity of users, devices, and services, ensuring secure communication and data integrity.
What is Symmetric encryption?
Symmetric encryption means that anytime you are performing a decryption of some information, you’re using the same key that you used to encrypt that information.
What is Asymmetric encryption?
Asymmetric encryption means that two (or more) keys are used, one for encryption and one key for decryption.
One becomes the private key and the other becomes the public key.
How does it work?
Anyone that has the public key, can encrypt data with that key and then send the encrypted data to you, and only the holder of the private key can decrypt the data.
What is transport encryption and provide examples of it.
Transport encryption is encrypting data on the move.
For example browsers use https for encrypted data in transit.
VPNs encrypts all data transmitted over the network.
- Client based VPN use SSL/TLS
- Site to Site VPN use IPsec
Explain encryption algorithms
Encryption algorithm provides the formula to be used during the encryption and decryption process. Both sides, the encrypting side and decrypting side must use the same encryption algorithm.
Why are cryptographic key lengths important?
Brute force attacks are commonly used by attackers to find the key. This means that brute force attacks try every possible key combination. The longer the key, the more combination would be available, therefore more secure.
What’s a typical key length for symmetric encryption?
128-bit or larger symmetric keys are common
What’s a typical key length for asymmetric encryption?
3072 bits or even larger
What is meant by key stretching /strengthening?
This means that in order to make a key more secure, you would hash a password, and then hash the hash of the password, and hash the hash … and continue
What is Out-of-band key exchange?
This means that the key is shared through means that are not in the internet. This would be through in person, over a telephone and so on.
What is In-band key exchange?
This means that the key is shared through the network. This would use additional security such as:
- If the goal is to share a symmetric key, then this key can be encrypted with a asymmetric key, and then send the key along with the asymmetric public key.
Explain session keys
Session keys are used for temporary basis for a specific session.
Explain the key exchange algorithms.
Key exchange algorithms means the following:
System A has its own private key.
System B has its own private key.
If system A wants to send information to system B, then it can combine its private key with System B public key.
Then when the information is received in system B, system B can combine its private key with System A public key.
Now the two systems can securely communicate with each other.
What is a TPM?
Its a Trusted Platform Module (TPM) to provide cryptographic functions for a specific computer.
It can create keys.
It can store keys such as bitlocker keys.