Security+ Flashcards
Symmetric Encryption
Single Key (Private Key)
Asymmetric Encryption
Two Keys (Public Key)
Stream Cipher
Bit-by-bit with XOR
Block Cipher
Block-by-block
DES and 3DES
Old Symmetric Block Cipher
IDEA
Symmetric Block Cipher (Not Widely Used)
AES
Symmetric Block Cipher (Widely Used Standard)
RC4, RC5, RC6
Symmetric Stream Cipher, used in SSL and WEP
Diffie-Helman (DH)
Asymmetric and used for VPN
RSA
Asymmetric used for MFA and Digital Signatures
ECC
Asymmetric used for Tablets/Mobile applications
MD5
Older Less Secure Hashing Algo
SHA-1, SHA-2, SHA-3
More Secure Hashing Algo
RIPEMD
Hashing Algo
HMAC
Message Authentication Hashing Solution
Digital Signature
Created by using hashing and encrypting with private key
PKI
Framework built on Asymmetric Encryption
Certificate Authority (CA)
They issue digital certificates
Key Escrow
Keys stored in secure 3rd party location, in case keys are somehow lost
Digital Certificate
digitally signed doc that binds a public key with a user’s identity
Registration Authority (RA)
Digital Certs are requested from an RA which will pass on the info to the CA
TPM (Trusted Platform Module)
Hardware Encryption Solution (BitLocker) (Personal Vault)
HSM (Hardware Security Module)
Hardware Encryption Solution (Financial Transactions)(Compliance) (Big Bank Vault)
KMS (Key Management System)
Big Daddy System that Generates, Distributes, manages, and deletes keys