security Flashcards
how do computers agree on how to encrypt?
client sends its encryption capabilities (e.g. RSA, Diffie-Hellman, DSA), cipher (e.g. RC4, Triple DES, AES), and hash (e.g. HMAC-MD5, HMAC-SHA), as well as TLS version, and random number to calculate keys. server responds with what it chooses.
what follows encryption protocol agreement?
server sends its certificate
when is symmetric key encryption done?
I think on the “start encrypting” stage, via calculating a master secret code
what does SSL accomplish?
encryption and identification
what’s in a CA certificate?
version
serial number
algorithm ID
issuer
validity dates
company details of subject
subject public key info (algorithm, key)
Identifier for issuer
identifier for company
signature algorithm
signature
how does browser know that CA certificates are valid?
browser has list of certificate authorities with their certificates
what is a trapdoor function?
a function that is easy to compute, but difficult to inverse without the trapdoor