Shared Flashcard Set

Details

Security+ SY0-501 8 Cryptography
Security+ SY0-501 Cryptography
38
Other
Not Applicable
07/25/2018

Additional Other Flashcards

 


 

Cards

Term
Hashing
Definition
algorithms are used to generate a fixed-length value mathematically from a message. The most common * standards for cryptographic applications are the SHA and MD algorithms.
Term
symmetric
Definition
algorithm requires that receivers of the message use the same private key. This algorithms can be extremely secure. This method is widely implemented in governmental applications.
Term
Asymmetric
Definition
algorithms use a two-key method of encryption. The message is encrypted using the public key and decrypted using a second key or private key. The key is derived from the same algorithm.
Term
confidentiality, integrity, authentication, and nonrepudiation.
Definition
the primary objectives for using cryptographic systems.
Term
DES (Data Encryption Standard)
Definition

- Symmetric encryption algorithm

- Block cipher operating on 64-bit blocks

- Key length of 56 bits

- Now considered insecure

Term
3DES
Definition
  • Symmetric encryption algorithm
  • Block cipher operating on 64-bit blocks
  • Key length of 112 bits
  • Considered secure
Term
AES (Advanced encryption standard):
Definition
- Symmetric encryption algorithm
- Block cipher operating on 128-bit blocks
- Key length of 128, 192 or 256 bits
- Considered secure
- used to encrypt network communication, or hard drives.
Term
Blowfish
Definition
- Symmetric encryption algorithm
- Block cipher operating on 64-bit blocks
- Key length of 21 and 448 bits
- Now considered insecure
Term
Twofish
Definition
- Symmetric encryption algorithm
- Block cipher operating on 128-bit blocks
- Key length of 128, 192 or 256 bits
- Considered secure
Term
RC4
Definition
- Symmetric encryption algorithm
- Stream cipher
- Key length between 40 bits and 2048 bits
- Now considered insecure
- Used for network encryption WAP, WPA, SSL,TLS
Term
PGP - Pretty Good Privacy
Definition
uses public and private keys pairs to encrypt and digitally sign messages.
Term
Gnu Privacy Guard (GPG)
Definition
is an implementation of open PGP standards.
Term
MD5 - Message Digest 5
Definition
is a hashing algorithm that computers a digest from provided data. Any changes in the data will indicate the digest; thus, data integrity is attained.
- Message digest is another term for hash
- It produces a 128-bit hash
- it is no longer recommended
- SHA (1 or 2) are the recommended alternatives.
Term
SHA-1
Definition
- It produces a 160-bit hash
- it is no longer recommended
Term
SHA-2
Definition
- It produces output of 224, 256, 384 and 512-bit hash
- Consist of a family of six hush functions
- Uses a mathematically similar approach to SHA-1 and MD5
Term
SHA-3
Definition
- Designed eventually to replace SHA-2
- Uses a completely different hash generation approach than SHA-2
- Produces hashes of user-selected fixed length
Term
RIPEMD (Integrity Primitives Evaluation Message Digest)
Definition
- Created as an alternative to government-sponsored hash functions
- Produces 128, 160, 256 and 321-bit hashes
- Contains flaws in the 128-bit version
Term
HMAC (hash-based message authentication code)
Definition
- uses a hashing algorithm along with a symmetric key.
- Provides authentication and integrity
Create and verify message authentication code by using a secret key in conjunction with a hash function
Term
Approved DSS (Digital signature standards) Algorithms
Definition
- Digital Signature Algorithm (DSA)
- Rivest, Shamir, Adelman (RSA)
Elliptic Curve Digital Signature Algorithm (ESDSA)
Term
Online Certificate Status Protocol (OCSP)
Definition
CAs provide a real-time service that allows users to verify that a certificate is not revoked
Term
Certificate Stapling
Definition
is a method used with OCSP, which allows a web server to provide information on the validity of its own certificate rather than needing to go to the certificate vendor. This is done by the web server essentially downloading the OCSP response from the certificate vendor in advance and providing that to browsers.
Term
Certificate Revocation list (CRL)
Definition
CAs provide a list of the serial numbers of revoked certificates
Term
Extensible Authentication Protocol (EAP)
Definition
a framework frequently used in wireless networks and point-to-point connections, framework with many variants, some secure, some no
Term
LEAP - Lightweight EAP
Definition
insecure protocol that relies upon MS-CHAP
Term
EAP-TLS
Definition
This protocol utilizes TLS in order to secure the authentication process. Most implementations of this protocol utilize X.509 digital certificates to authenticate the users. Cryptographic keys can be stored on smartcards. Smartcards are not stored on servers, they are used on client stations, normally with PIN
Term
PEAP Protected Extensible Authentication Protocol
Definition
Tunnels EAP inside an encrypted TLS session, creates secure channel for user authentication using a server side PKI certificate initially, then symmetric session key is used for the remainder of the session
Term
EAP – FAST or Flexible Authentication via Secure Tunneling
Definition
This protocol was proposed
by Cisco as a replacement for the original EAP. this protocol establishes a TLS tunnel for authentication, but it does so using a Protected Access Credential (PAC).
Term
PAP - Password Authentication Protocol
Definition
should be disables when hardening VPNs, as it sends unencrypted passwords across the network during authentication
Term
MS-CHAP v2 - Microsoft Challenge Handshake Authentication Protocol
Definition
hashes credentials on both sides of a connection
Term
NTLM - NT LAM Manager
Definition
hashes data on both sides of a connection similarly to CHAP
Term
FTPS - File Transfer Protocol Secure
Definition
can use Secure Sockets Layer (SSL) to secure FTP traffic
Term
SFTP - Secure File Transfer Protocol
Definition
refers tunneling FTP traffic through a Secure Shell (SSH) - encrypted session
Term
ECC - Elliptic curve cryptography
Definition
is public key cryptography based on points on an elliptic curve, does not use prime factorization
Term
Tor - The Onion Router
Definition
is a software package that uses encryption and relay nodes to facilitate anonymous Internet access.
Term
Diffie-Hellman
Definition
is secure key exchange protocol used for asymmetric encryption and is provide through a cryptographic service provider, often in the form of an API library or module. Neither used for symmetric encryption nor is it a hashing algorithm
Term
Elliptic Curve Diffie Hellman (ECDH):
Diffie-Hellman Groups:
- Large group number more secure
- Secure group starts after Group 14
Definition
uses similar to DH approach but with elliptic curve problem
Term
PBKDF2 (Password-Based Key Derivation Function 2)
Definition
is part of PKCS #5
v. 2.01. It applies some function (like a hash or HMAC) to the password or passphrase
along with Salt to produce a derived key.
Term
Bcrypt
Definition
is used with passwords, and it essentially uses a derivation of the Blowfish
algorithm converted to a hashing algorithm to hash a password and add Salt to it
Supporting users have an ad free experience!