Security Concepts - Cryptography Flashcards

1
Q

set of identities, roles, policies and actions for creations, use, management, distribution and revocation of public and private keys

A

Public Key Infrastructure (PKI)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

is a set of rules, which can also be called an algorithm, about how to perform encryption and decryption

A

ciphers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

a symmetric key cipher (meaning the same key is use to encrypt and decrypt) that operates in a group of bits called block

A

block cipher

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Example of block cipher algorithm

A
  • Advanced encryption standard (AES)
  • Triple Digitals encryption standard (3DES)
  • Blowfish
  • Digital encryption standard (DES)
  • International Data Encryption Algorithm (IDEA)
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

is a symmetric key cipher where the plaintext data to be encrypted or decrypted is done a bit at a time against the bits of the key stream also called cipher digit stream

A

stream cipher

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

algorithm that uses same key to decrypt and encrypt

-AES, DES, 3DES, IDEA

A

symmetric algorithm

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

algorithm that uses different key that mathematically works together as a pair called public and private key
-RSA, Diffie-Hellman

A

asymmetric algorithm

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

example so asymmetric algorithm

A
RSA(River,  Shamir and Adleman)
DH (Deffie-Hellman)
ElGamal
DSA
ECC
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Method to used to verify data integrity

A

Hashing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

3 most popular hashes

A

MD5 (message digest 5) - create 128digest
SHA-1 (Secure Hash Algo 1) 160 digest
SHA-2 (Secure Hash Algo 2) 224 digest

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

uses the mechanism of hashing. it includes in its a calculation a secret key of some type.

A

HMAC(hashed message authentication code)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

digital signature core benefits

A
  • authentication
  • data intergrity
  • nonrepudiation
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

deals with generating, verifying, exchanging, storing keys and destroying keys

A

key management

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

is a suite of protocols used to protect IP packets. provides the core benefits of confidentiality through encryption, data integrity through hashing and HMAC and authentication using. digital signatures or using a pre-shared key (PSK) that Is just for authentication similar to a password

A

IPSEC

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

IPSec Components

A
  • ESP and AH
  • Encryption algo for confidentiality (DES,3DES and AES)
  • Hashing algo for integrity: MD5 and SHA
  • Authentication algo: PSK and RSA digital signatures
  • Key Management: DH,PKI,IKE(Internet Key Exchange)
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Encryption of hash using private key and decryption of hash with the senders public key. (RSA Signatures)

A

Digital Signatures

17
Q

Uses a public-private key pair asymmetrical algorithm but creates final shared secrets (keys) that are then used by symmetrical algorithms. Used in IPSEC

A

Diffie-Hellman Key Exchange

18
Q

Encryption algorithm provide this by converting clear text into cipher text. (AES,DES,3DES,RSA,IDEA)

A

Confidentiality

19
Q

Validates data by comparing hash values. (MD5,SHA-1, SHA-2, SHA-3)

A

Data Integrity

20
Q

Verifies the peer’s identity. (PSK, RSA Signatures)

A

Authentication

21
Q

is a computer or entity that create and issues digital certificates

A

Certificates Authorities

22
Q

Certificate that contains public key of the CA server and the other details about the CA server.

A

Root certificate

23
Q

a certificate similar to root certificate but it describes the client and contains the public key of and individual hosts

A

Identity certificates

24
Q

is a series of standards focused on directory services and how those directories are organised. (Microsoft Active Directory)

25
standard for digital certificates that is widely accepted and incorporates many of the same and naming standard. (Lightweight Directory Access Protocol)
X.509v3
26
PKCS> this is a format of a certificate request send to a CA that wants to receive its identity certificate. This type of request would include the public key for the entity desiring a certificate
PKCS#10
27
PKCS> this a format that can be used by a CA as a response to a PKCS#10 request. The response itself will very likely be the identity certificate
PKCS#7
28
PKCS>The RSA cryptography standard
PKCS#1
29
PKCS>A format for storing both public and private keys using a symmetric password-based key to "unlock" the data whenever the key needs to be used for accessed
PKCS#12
30
PKSC. Diffie-Hellman Key exchange
PKCS#3
31
can automate the process for requesting and installing an Identity certificate
Simple Certificate Enrolment Protocol (SCEP)
32
is a list of certificates based on their serial numbers that had initially been issued by. CA but have since been revoked and as a result should not been trusted
Certificate revocation list (CRL)
33
alternative to CRLs. Using this method, a client simply sends a request to find the status of a certificate and gets a response without having to know the complete list of revoked certiciates
Online Certificate Status Protocol (OCSP)
34
Cisco service that provide support for validating digital certificates including check to see wether a certificate has been revoked
Cisco AAA
35
Methods of Cipher - the units of the plaintext are rearranged in a different and usually quite complex order, but the units themselves are left unchanged
Transposition Cipher
36
is a method of encrypting by which units of plaintext are replaced with ciphertext, according to a fixed system; the "units" may be single letters (the most common), pairs of letters, triplets of letters, mixtures of the above, and so forth. The receiver deciphers the text by performing the inverse substitution.
Substitution Cipher
37
Relevants Part of Certificate
``` Serial number Issuer Validity Dates Subject of Certificates Public key Thumbprint algo and thumbprint ```
38
An algorithm that allows two devices to negotiate and establish shared secret keying materials (keys) over untrusted network
Diffie-hellman
39
Common methods used by ciphers
- transposition - substitution - polyalphabetic