Security Plus - Chapter 7 Flashcards

1
Q

Cryptography

A

The practice of encoding information in a manner that it cannot be decoded without access to the required decryption key.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Encryption

A

Transforming plain text information into cyphertext using an encryption key.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Decryption

A

Transforming cyphertext into plain text using a decryption key.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Goals of Cryptography

A
  • Confidentiality - Encryption is used to protect sensitive information from persons that do not have the need to have the information.
  • Integrity - Ensures that data is not maliciously or unintentionally altered
  • Authentication - Validating the identity of an individual
  • Non-repudiation - Ensures that individuals can prove to a third-party that a message came from its purported sender.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Cipher

A

A method used to scramble or obfuscate characters to hide their value.
Algorithms used to perform encryption and decryption operations of secret messages.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Substitution

A

A type of coding or cypher system that changes one character or symbol into a different one.
- Caesar cipher - used by Julius Caesar
- ROT13 - Means you rotate the characters 13 positions to decipher the original message.
- Polyalphabetic - Using multiple substitution alphabets for the same message. - Vigenere cipher - Used a keyword to look up the cipher text in a table to decipher the message.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Transposition Cipher

A

Involves transposing or scrambling the letters in a certain manner to hide the value of the message.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Columnar Transposition

A

Choose the number of rows in advance, which is the encryption key, then write the message by placing successive characters in the next row until you get to the bottom of the column.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

The Enigma Machine

A

German government during World War II produced to provide secure communications between military and political units. Similar to a typewriter, the encryption code could be updated as needed based on the days encryption algorithm. The machine was based on polyalphabetic substitution which changed the substitution for each character of the message.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Stenography

A

The art of using cryptographic techniques to embed secret messages within another file. Alterations are made to the least significant bits of the many bits that make up image files.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Confidentiality

A

Ensures that data remains private in three different situations: when it is at rest, when it is in transit, and when it is in use.
Types of cryptosystems that enforce confidentiality:
- Symmetric cryptosystems - Use a shared key available to all users of the cryptosystem
- Asymmetric cryptosystems - Use individual combinations of public and private keys for each user of the system.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Obfuscation

A

The practice of making it intentionally difficult to for humans to understand how code works.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Encrypting Data at Rest

A

Encrypt data on disk - Data stored directly on a disk may be managed with full-disk encryption, partition encryption, file encryption, and volume encryption.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Full-Disk Encryption

A

A form of encryption where all the data on a hard drive is automatically encrypted, including the operating system and system files.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Partition Encryption

A

Targets a specific partition of a hard drive to encrypt.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

File-Level Encryption

A

This allows users to encrypt specific files on a hard drive which allows for easier setup and management.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Volume Encryption

A

Encrypting a set “volume” on a storage device, which may contain several folders and files.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Database Encryption

A

A method used to protect sensitive information stored in a database from access by unauthorized users.
- Transparent data encryption (TDE) - Encrypts the entire database
- Column-level encryption (CLE) - Allows for specific columns within a table to be encrypted.
Record level encryption - Allows for individual records within a database to be encrypted.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Integrity

A

Ensures that data is not altered without authorization.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Message Integrity

A

Encrypting messages through the use of message digest or digital signatures, which are validated by the recipient of the message, ensuring the message was not altered during transit.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Authentication

A

Verifies the claimed identity of system users and is a major function of cryptosystems.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

Non-repudiation

A

Assurance to the recipient that the message was originated by the sender and not someone masquerading as the sender. Prevents the sender from claiming they never sent the message initially.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

Key Space

A

The range of values that are valid for use as a key for a specific algorithm. It is defined by its key length (the number of binary bits). The range of numbers between 0 and 2 to the nth power. o to 2 to the 128th is a 128-bit key.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

Algorithm

A

A set of rules, usually mathematical, that dictates how enciphering and deciphering processes are to take place.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

Block Ciphers

A

operate on chunks or blocks of a message and apply the encryption algorithm to an entire message block at the same time. An example is the transposition cipher and columnar transposition.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

Stream Ciphers

A

Operate on one character or bit of a message or data stream at a time. The algorithm operates on each letter of the message independently. The Caesar cipher and one-time pad cipher are examples.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

Symmetric Key Algorithm

A

Rely on a shared secret encryption key that is distributed to all members who participate in the communications. The sender encrypts with the shared key, and the receiver decrypts with the shared key. Provides confidentiality.
- Private Key Cryptography
- Secret Key Cryptography
Cons:
- Key distribution must occur through secured online channels or sending offline through an out of band method.
- Does not provide non-repudiation
- The algorithm is not scalable for large groups to use for communicating
- Keys must be regenerated often

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

Asymmetric Key Algorithm

A

Public Key Algorithm. Each user has two keys, a public key, and a private key, which is kept secret and known only to the owner of the key pair. Opposite and related keys must be used in tandem to encrypt and decrypt. If the public key encrypts a message, then the corresponding private key must decrypt the message.
Provide support for digital signature technology.
Strengths of Asymmetric cryptography:
- Adding new users requires generation of only one public-private key
- Users are removed more easily by including a key revocation system
- Key regeneration is only required if the user’s private key has been compromised
- Provides integrity, authentication, and non-repudiation
- Key exchange is a simple process by making their public key available, and then keeping their private key secured
No preexisting communication link is needed, so users can begin communicating right away by providing their public key.
Cons of Asymmetric cryptography:
- Slow speed of operation
- Best when used with smaller data set transmission

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

Summary of Symmetric vs. Asymmetric

A

Attributes
Keys Symmetric - Same key is used by sender to encrypt and
receiver to decrypt
Asymmetric - Each user has a key pair - a public key and
a private key

Key Exchange Symmetric - Out-of-band
Asymmetric - Public key is freely shared

Speed Symmetric - Algorithm is less complex and much faster
Asymmetric - Algorithm is more complex and slower

Number of keys Symmetric - N*(N-1)/2
Asymmetric - 2N

Use Symmetric - Bulk encryption, meaning encrypting files and
communication
Asymmetric - Key encryption and digital signatures.

Security service provided Symmetric - Confidentiality
Asymmetric - Confidentiality,
authentication, and non-repudiation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q

Hashing Algorithm

A

Produces message digests which are summaries of the messages contents. It is extremely difficult to derive a message from an ideal hash function, and very unlikely that two messages will produce the same hash value. If this occurs, it is known as collision.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
31
Q

Symmetric Cryptography

A

Data Encryption Standard (DES)
Triple DES (3DES)
Advanced Encryption Standard (AES)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
32
Q

Symmetric Cryptography Overview

A

Pros: - Provides fast data transfer
- Good strong privacy
Cons: - Out of band key distribution
- Doesn’t scale well
- Doesn’t provide non-repudiation
Aliases - Secret, Private, Shared, Session

A single key shared by both parties

Symmetric Ciphers
- Stream - one bit at a time
- Block - chunks of data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
33
Q

Symmetric Algorithms

A

DES
3DES
AES
RC-4
RC-5
Two Fish
Blowfish
IDEA
CAST
MARS
Skipjack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
34
Q

Data Encryption Standard

A

Published in 1977 and is no longer in use due to flaws in the algorithm. Officially retired in 2001.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
35
Q

Triple DES

A

Uses the DES algorithm three times, with three different encryption keys produced. This is also considered insecure and was retired in 2023.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
36
Q

Advanced Encryption Standard

A

Introduced in 2000, the Rijndael block cipher was chosen as the replacement for DES. The Federal Information Processing Standard (FIPS) mandated the use of Rijndael/AES for the encryption of all sensitive information.
This cipher allows the use of 3 key strengths128, 192, & 256. The number of encryption rounds depends on the key length.
128 bit key = 10 rounds of encryption
192 bit key = 12 rounds of encryption
256 bit key = 14 rounds of encryption

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
37
Q

Symmetric Key Management

A

Provides safeguards around key creation, distribution, storage, destruction, recovery, and escrow of secret keys.

38
Q

Key Exchange

A

The secure distribution of the secret keys required to operate algorithms.
- Offline distribution
- Public key encryption
- Diffie-Hellman algorithm

39
Q

Offline Key Distribution

A

Physical exchange of key material. May flaws can occur while providing a physical distribution of a key.

40
Q

Public Key Encryption

A

A secured link is established between two parties. a secret key is exchanged over the secured public key link. Then, communication is switched from the public key algorithm to the secret key algorithm. The secret key algorithm provides increased processing speed.

41
Q

Diffie-Hellman Algorithm

A

The communicating parties agree on two large numbers, P (prime number), and G (integer number) where 1 < G< P. Sender chooses an integer R and calculates the number with the formula R=g to the r mod P. Receiver chooses an integer S and calculates this in the formula S=g to the s mod P. Sender sends R to the receiver, Receiver sends S to the sender. Sender calculates formula K= S to the r mod P, and receiver calculates K= R to the s mod P. This provides K as the secret key they use for transmission of messages.

42
Q

Storage of Encryption Key Best Practices

A

Never store an encryption key on the same system where the encrypted data resides.
For highly sensitive keys, use two different individuals with half of the key. They must collaborate to re-create the entire key. Principle of split knowledge. For Symmetric cryptography, when a person with knowledge of the key leaves an organization, the keys must be changed and any data encrypted with the original keys must be re-encrypted with the new key.

43
Q

Key Escrow

A

Utilize a third-party to store a protected copy of the key.

44
Q

Key Recovery Policy

A

Specifies the circumstances under which a key may be retrieved from escrow and used without a user’s knowledge.

45
Q

Asymmetric Cryptography

A

Users make their public keys freely available to anyone they will need to communicate with. The sender will utilize the organization public key to encrypt the message, then send to the organization. Once the organization receives, it can only be decrypted by the organizations private key. Public Key Encryption. Asymmetric keys must be longer than symmetric keys and utilize a higher degree of computations to ensure equivalent strength to symmetric.

46
Q

Asymmetric Cryptography Overview

A

Every user has a key pair which consists of a public kay and a private key
Anything encrypted with one key can only be decrypted by the other

47
Q

Rivest Shamir Adleman Cryptosystem (RSA)

A

Created in 1977 and is still a standard used today. The algorithm depends on the computational difficulty inherent in factoring large prime numbers. Each user of the cryptosystem generates a pair of public and private keys using the algorithm.

48
Q

Elliptic Curve Cryptography

A

Created in 1985 as a mathematical based on points along the curve and performing a mathematical function y squared = x to the third + ax+ b. In the formula, x, y, a, and b are real numbers.

49
Q

Hash Functions

A

Take a potentially long message and generate a unique output value derived from the contents of the message. The output value = message digest.

50
Q

Message Digest Purposes

A

Message digests are sent to the recipient along with the full message for two reasons:
- The recipient can use the same hash function to recompute the message digest from the full message.
- The message sent by the originator is the same one received by the recipient.
- The message digest can be used to implement a digital signature algorithm.

51
Q

Hash Function Requirements

A
  • They accept an input of any length.
  • They produce an output of a fixed length, regardless of the length of the input.
  • The hash value is relatively easy to compute.
  • The hash function is one-way (meaning that it is extremely hard to determine the input when provided with the output).
  • A secure hash function is collision free (it is extremely hard to find two messages that produce the same hash value).
52
Q

Secure Hash Algorithm (SHA)

A

Government standard hashing functions published in the Secure Hash Standard (SHS) known as FIPS 180. There are several versions of the SHA algorithm:
- SHA-1
- SHA-2
- SHA-3

53
Q

SHA-1 Hashing Algorithm

A

Takes an input of virtually any length and produces a 160-bit message digest. It processes a message in 512-bit blocks. If not in a 512-bit block, the message digest will pad the message with data to meet the next multiple of 512.

54
Q

SHA-2 Hashing Algorithm

A

This is doubling of the processing of SHA-1, and is considered secure, but the weaknesses of SHA-1 can be revealed with persistence. There are 4 variations of SHA-2:
- SHA-256 - produces a 256-bit message digest using a 512-bit block size.
- SHA-224 - uses a truncated version of SHA-256 hash to produce a 224-bit message digest using a 512-bit block size.
- SHA-512 - produces a 512-bit message digest using a 1,024-bit block size.
- SHA-384 - Uses a truncated version of the SHA-512 hash to produce a 384-bit digest using a 1,024-bit block size.

55
Q

SHA-3 Hashing Algorithm

A

Published in 2015, also known as the Keccak algorithm, was developed to serve as a drop-in replacement for SHA-2 hash functions offering the same variants and lengths using a more secure algorithm.

56
Q

MD5

A

Published in 1991 by Ron Rivest (RSA). It processes 512-bit blocks of the message, but it uses four distinct rounds of computation to produce a digest. Implements security features to that reduce the speed of the message digest production significantly. It is subject to collisions preventing the ability to use it for integrity.

57
Q

Digital Signatures

A

Digitally signed messages assure the recipient that the message came from the claimed sender. This enforces non-repudiation. They assure that the message was not altered while in transit between the sender and recipient as well. This protects against both malicious and unintentional modification. They rely on two concepts, public key cryptography and hashing functions.
Ensure that the goals of integrity, authentication, and non-repudiation are met. Does not guarantee privacy.

58
Q

Digital Signature Process

A
  • A message digest of the original plain-text message is created using one of the hashing algorithms.
  • The message digest is encrypted using the sender’s private key. The encrypted message digest is the digital signature.
  • The sender appends the signed message digest to the plain-text message.
  • The sender transmits the appended message to receiver.
  • The receiver reverses the order of operations
  • The receiver decrypts the digital signature with sender’s public key
  • The receiver uses the same hashing function to create a message digest of the full plain-text message
  • The receiver compares the decrypted message with the message digest they computed. If the two digests match, the receiver is assured this is actual message from sender.
59
Q

Hash-Based Message Authentication Code Algorithm (HMAC)

A

Implements a partial digital signature which guarantees integrity but does not guarantee non-repudiation. HMAC can be combined with any standard message digest generation algorithm by using a shared key.

60
Q

Public Key Infrastructure (PKI)

A

A trust relationship between two entities that permits combining asymmetric cryptography with symmetric cryptography along with hashing and digital certificates.

61
Q

Digital Certificates

A

Provide communicating parties with the assurance that the people they are communicating with are who they claim to be. When users verify that a certificate was signed by a trusted certificate authority (CA), the public key is legitimate. Certificates contain specific identifying information, and they are governed by an international standard, X.509. Certificates contain the below attributes:
- Version x.509 which they conform to
- Serial number (from the certificate creator)
- Signature algorithm identifier (specifies the technique used by the certificate authority to digitally sign the contents of the certificate)
- Issuer name (identification of the certificate authority that issued the certificate)
- Validity period (specifies the dates and times; a starting date and time, and an expiration date and time; during which the certificate is valid)
- Subject’s common name (CN) that clearly describes the certificate owner
- Certificates may optionally contain Subject Alternative Names (SANs) that allow you to specify additional items (IP addresses, domain names, etc) to be protected by the single certificate
- Subject’s public key (the actual public key the certificate owner used to set up secure communications)

62
Q

Why Certificates are Issued

A

Providing assurance for the public keys of:
- Computers/Machines
- Individual users
- Email addresses
- Developers (code-signing certificates)

63
Q

Certificate Authorities (CA)

A

Neutral organizations that offer notarization services for digital certificates. They must carefully protect their own private keys to preserve the trust relationships. They usually utilize an offline CA to protect their root certificate, the top-level certificate for their entire PKI that is the root of trust for all the certificates they issue. The offline CA is disconnected, powered down, and not accessible until it is needed. The offline CA uses the root certificate to create subordinate intermediate CAs that serve as the online CAs used to issue certificates.

64
Q

Registration Authorities (RA)

A

Assist CAs with the burden of verifying users’ identities prior to issuing digital certificates.

65
Q

Certificate Enrollment

A

Identity is proven to a CA, then you must provide the CA with your public key in the form of a Certificate Signing Request (CSR), then the CA will create an x.509 digital certificate with your identifying information and a copy of your public key. The CA then digitally signs the certificate using your private key and provides you with a copy of your signed digital certificate.

66
Q

Types of Certificates

A

Domain Validation certificate (DV) - The CA verifies that the certificate subject has control of the domain name.
Extended Validation Certificate (EV) - Provide a higher level of assurance by the CA taking steps to verify that the certificate owner is a legitimate business before issuing the certificate.

67
Q

Steps of the Certificate Process

A

Certificate Enrollment
Certificate Verification
Certificate Revocation

68
Q

Certificate Verification

A

When receiving a certificate, the certificate is checked with the CA’s digital signature using the CA’s public key. Verify the certificate was not revoked using the certificate revocation list (CRL) or Online Certificate Status Protocol (OCSP). Once that validation is completed, you must verify the following:
- The digital signature of the CA is authentic
- You trust the CA
- The certificate is not listed on a CRL
- The certificate actually contains the data you are trusting
Before you trust an identifying piece of information about someone, be sure that it is actually contained within the certificate. It only verifies the information listed in the certificate.

69
Q

Digital Certificate Verification Algorithms

A

Algorithms that are built into web browsers and email clients.

70
Q

Certificate Pinning

A

Instruct web browsers to attach a certificate to a subject for an extended period of time. The browser associates that site to their public key.

71
Q

Certificate Revocation

A

When the CA needs to remove a certificate from being available.

72
Q

Reasons for a Certificate Revocation

A
  • The certificate was compromised (the certificate owner allowed the private key to become exposed)
  • The certificate was erroneously issued (the CA mistakenly issued a certificate without proper verification)
  • The details of the certificate changed (the subject’s name was changed)
  • The security association changed (the subject is no longer employed by the organization sponsoring the certificate)
73
Q

Techniques for Verifying and Identify Revoked Certificates

A

Certificate Revocation List (CRL) - Maintained by the various certificate authorities and contain the serial numbers of the certificates that have been issued by a CA and revoked along with the date and time the revocation went into effect.
Online Certificate Status Portal (OCSP) - Provides a means for real-time certificate verification. A client can send a request to validate a certificate to OCSP, the server then responds with the status of good, revoked, or unknown. This is used by web browsers for validation. This must verify every user that is accessing a web browser.
Certificate Stapling - An extension to the OCSP that relieves some of the burden placed upon CAs by the original protocol. The web server contacts the OCSP server itself and receives a signed and timestamped response from the OCSP server, which then attaches (staples) to the digital certificate. The user’s browser then that the certificate is authentic and validates the stapled OCSP response is genuine and current. Time saving comes in because a user revisiting a site and the time stamp is recent enough, there is no need to perform the validation process.

74
Q

Certificate Formats

A

Distinguished Encoding Rules (DER) - Certificates that are normally stored in files with .der, .crt, or .cer extension.
Privacy Enhanced Mail (PEM) - Certificates that are formatted in an ASCII text version of DER. Normally stored as file extensions .pem or .crt.
Personal Information Exchange (PFX) - Certificate format that is commonly used by Windows systems. May be stored in binary or text format. .pfx or .p12. p7b formats are stored in ASCII format.

75
Q

Sufficient Entropy

A

The cryptographic key is created using a totally random method.

76
Q

Hardware Security Modules (HSM)

A

Provide a way to manage encryption keys. Hardware devices that store and manage encryption keys in a secure manner that prevents humans from needing to work directly with the keys.

77
Q

Cryptographic Attacks

A

Brute Force
Frequency Analysis
Known Plain Text
Chosen Plain Text
Related Key Attack
Birthday Attack
Downgrade Attack
Rainbow Table Attack
Exploiting Weak Keys
Exploiting Human Error

78
Q

Brute Force

A

Involves trying every possible key. It will eventually work, but could take an extremely long time to be successful.

79
Q

Frequency Analysis

A

Looks at the blocks of an encrypted message to determine if any common patterns exist. Only good for historical ciphers

80
Q

Known Plain Text

A

Relies on the attacker having pairs of known plain text along with the corresponding ciphertext.

81
Q

Chosen Plain Text

A

The attacker obtains the ciphertext messages corresponding to a set of plain text messages.

82
Q

Birthday Attack

A

Based on the theory of how many people would need to be in a room to have at least two people with the same birthday? This is not to determine a guaranteed match, but a high probability that a match is likely.

83
Q

Downgrade Attack

A

Sometimes used against secure communications such as TLS to get a user or system to inadvertently shift to a less secure cryptographic protocol.

84
Q

Rainbow Table Attack

A

Attempt to reverse the hashed password values by precomputing the hashes of common passwords.

85
Q

Exploiting Weak Keys

A

When a cryptographic algorithm is in place but was implemented in a weak manner. Ex. Weak key generation. WEP protocol uses an improper implementation of RC4 encryption which provide numerous vulnerabilities.

86
Q

Exploiting Human Error

A

One user may send a secured message to multiple recipients. The none of those recipients then send the message on to another recipient and not secure it appropriately. Another example is that a user may use an outdated version of the encryption algorithm not knowing that a newer, more secure version has been implemented.

87
Q

Perfect Forward Secrecy

A

Laters of encryption prevent nodes in the relay chain from reading anything other than the specific information they need to accept and forward the traffic. TOR router uses this.

88
Q

Blockchain

A

A distributed and immutable open public ledger. It can store records in a way that distributes those records among many different systems located around the world and in a manner that prevents anyone from tampering with those records.

89
Q

Homomorphic Encryption

A

Allows the ability to protect the privacy of individuals but still able to perform calculations on their data.

90
Q

Quantum Computing

A

Attempts to use quantum mechanics to perform computing and communication tasks.