Security Concepts - Cryptography Flashcards

1
Q

set of identities, roles, policies and actions for creations, use, management, distribution and revocation of public and private keys

A

Public Key Infrastructure (PKI)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

is a set of rules, which can also be called an algorithm, about how to perform encryption and decryption

A

ciphers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

a symmetric key cipher (meaning the same key is use to encrypt and decrypt) that operates in a group of bits called block

A

block cipher

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Example of block cipher algorithm

A
  • Advanced encryption standard (AES)
  • Triple Digitals encryption standard (3DES)
  • Blowfish
  • Digital encryption standard (DES)
  • International Data Encryption Algorithm (IDEA)
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

is a symmetric key cipher where the plaintext data to be encrypted or decrypted is done a bit at a time against the bits of the key stream also called cipher digit stream

A

stream cipher

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

algorithm that uses same key to decrypt and encrypt

-AES, DES, 3DES, IDEA

A

symmetric algorithm

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

algorithm that uses different key that mathematically works together as a pair called public and private key
-RSA, Diffie-Hellman

A

asymmetric algorithm

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

example so asymmetric algorithm

A
RSA(River,  Shamir and Adleman)
DH (Deffie-Hellman)
ElGamal
DSA
ECC
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Method to used to verify data integrity

A

Hashing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

3 most popular hashes

A

MD5 (message digest 5) - create 128digest
SHA-1 (Secure Hash Algo 1) 160 digest
SHA-2 (Secure Hash Algo 2) 224 digest

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

uses the mechanism of hashing. it includes in its a calculation a secret key of some type.

A

HMAC(hashed message authentication code)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

digital signature core benefits

A
  • authentication
  • data intergrity
  • nonrepudiation
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

deals with generating, verifying, exchanging, storing keys and destroying keys

A

key management

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

is a suite of protocols used to protect IP packets. provides the core benefits of confidentiality through encryption, data integrity through hashing and HMAC and authentication using. digital signatures or using a pre-shared key (PSK) that Is just for authentication similar to a password

A

IPSEC

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

IPSec Components

A
  • ESP and AH
  • Encryption algo for confidentiality (DES,3DES and AES)
  • Hashing algo for integrity: MD5 and SHA
  • Authentication algo: PSK and RSA digital signatures
  • Key Management: DH,PKI,IKE(Internet Key Exchange)
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Encryption of hash using private key and decryption of hash with the senders public key. (RSA Signatures)

A

Digital Signatures

17
Q

Uses a public-private key pair asymmetrical algorithm but creates final shared secrets (keys) that are then used by symmetrical algorithms. Used in IPSEC

A

Diffie-Hellman Key Exchange

18
Q

Encryption algorithm provide this by converting clear text into cipher text. (AES,DES,3DES,RSA,IDEA)

A

Confidentiality

19
Q

Validates data by comparing hash values. (MD5,SHA-1, SHA-2, SHA-3)

A

Data Integrity

20
Q

Verifies the peer’s identity. (PSK, RSA Signatures)

A

Authentication

21
Q

is a computer or entity that create and issues digital certificates

A

Certificates Authorities

22
Q

Certificate that contains public key of the CA server and the other details about the CA server.

A

Root certificate

23
Q

a certificate similar to root certificate but it describes the client and contains the public key of and individual hosts

A

Identity certificates

24
Q

is a series of standards focused on directory services and how those directories are organised. (Microsoft Active Directory)

A

X.500

25
Q

standard for digital certificates that is widely accepted and incorporates many of the same and naming standard. (Lightweight Directory Access Protocol)

A

X.509v3

26
Q

PKCS> this is a format of a certificate request send to a CA that wants to receive its identity certificate. This type of request would include the public key for the entity desiring a certificate

A

PKCS#10

27
Q

PKCS> this a format that can be used by a CA as a response to a PKCS#10 request. The response itself will very likely be the identity certificate

A

PKCS#7

28
Q

PKCS>The RSA cryptography standard

A

PKCS#1

29
Q

PKCS>A format for storing both public and private keys using a symmetric password-based key to “unlock” the data whenever the key needs to be used for accessed

A

PKCS#12

30
Q

PKSC. Diffie-Hellman Key exchange

A

PKCS#3

31
Q

can automate the process for requesting and installing an Identity certificate

A

Simple Certificate Enrolment Protocol (SCEP)

32
Q

is a list of certificates based on their serial numbers that had initially been issued by. CA but have since been revoked and as a result should not been trusted

A

Certificate revocation list (CRL)

33
Q

alternative to CRLs. Using this method, a client simply sends a request to find the status of a certificate and gets a response without having to know the complete list of revoked certiciates

A

Online Certificate Status Protocol (OCSP)

34
Q

Cisco service that provide support for validating digital certificates including check to see wether a certificate has been revoked

A

Cisco AAA

35
Q

Methods of Cipher - the units of the plaintext are rearranged in a different and usually quite complex order, but the units themselves are left unchanged

A

Transposition Cipher

36
Q

is a method of encrypting by which units of plaintext are replaced with ciphertext, according to a fixed system; the “units” may be single letters (the most common), pairs of letters, triplets of letters, mixtures of the above, and so forth. The receiver deciphers the text by performing the inverse substitution.

A

Substitution Cipher

37
Q

Relevants Part of Certificate

A
Serial number
Issuer
Validity Dates
Subject of Certificates
Public key
Thumbprint algo and thumbprint
38
Q

An algorithm that allows two devices to negotiate and establish shared secret keying materials (keys) over untrusted network

A

Diffie-hellman

39
Q

Common methods used by ciphers

A
  • transposition
  • substitution
  • polyalphabetic