Using Cryptographic Protocols Flashcards
Delete where appropriate: in email Digital Signatures, the sender encrypts with their public/private key?
The sender’s/recipient’s public/private key decrypts.
the sender signs with the private key
the sender’s public key decrypts
Delete where appropriate: in Email encryption, the recipients/sender
encrypts with the sender’s/recipient’s public/private key
The sender/recipient decrypts with the recipient’s/sender’s public/private key
to encrypt email, the sender encrypts the mail with the recipient’s public key.
the recipient’s private key decrypts (this is the same for website encryption)
Digital Signatures provide what 3 key security goals
Authentication
Non-repudiation
Integrity
What standard allows the emails to be encrypted and digitally signed using 3rd party authenticated certificates?
S/MIME (Secure Multipurpose Internet Mail Extensions)
SSL and TLS handshakes require what to be issued to complete the handshake?
a certificate
When two systems connect, what do they have to identify before any encryption starts happening?
A cipher suite
What are the 3 primary cryptographic solutions do cipher suites provide?
Encryption
Authentication
Integrity
A Crypto Module is hardware/software/firmware that implements ______ ______. To implement encryption, the module requires a xxx xxx xxx that is a XXXX XXXXX of algorithms
A Crypto Module is hardware/software/firmware that implements CRYPTOGRAPHIC FUNCTIONS. To implement encryption, the module requires a CRYPTO SERVICE PROVIDER that is a SOFTWARE LIBRARY of algorithms
if you wanted to encrypt email traffic but cost was an issue which standard would you use?
PGP/OpenPGP. Because there is no obligation to pay licence fees