Section 8: Cryptographiv Solutions

0.0(0)
studied byStudied by 0 people
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/77

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

78 Terms

1
New cards

ROT13 cipher

rotate 13 spots

  • ex. pelcgbtencul vf sha —> cryptography is fun

2
New cards

symmmetric vs asymmetric encryption

use the same key for encryption and decryption vs public key encryption and private key decryption

  • 1 key vs 2 keys

3
New cards

symmetric algorithm (private key)

both the sender and receiver must know the same shared secret using a privately held key

ex. house key

4
New cards

assymmetric algorithms (public key)

different keys are used to encrypt and decrypt the data

  • does not require a shared secret key

5
New cards

common asymmetric encryption algorithms

  • diffie-hellman

  • RSA

  • elliptic curve cryptography (ECC)

6
New cards

hybrid implementation

utilizes asymmetric encryption to securely transfer a private key that can then be used with symmetric encryption

7
New cards

stream cipher

utilizes a keystream generator to encrypt data bit by bit using a XOR function to creatte the ciphertext

  • symmetric algo

8
New cards

block cipher

breaks the input into fixed-length blocks of data and performs the encryption on each block

  • 64, 128, or 256 bit block size

9
New cards

common symmetric algorithms

  • DES

  • triple DES

  • IDEA

  • AES

  • blowfish

  • twofish

  • rivest cipher

10
New cards

data encryption standard (DES)

encrypts data in 64 bit blocks through 16 rounds of transposition and substitution to create ciphertext using an effective key strength of 56 bits

  • 70’s-00’s

11
New cards

triple DES (3DES)

uses three separate 56-bit symmetric keys to encrypt, decrypt, then encrypt the plaintext into ciphertext in order to increase the strength of DES

  • 112 bit key strength but slower than DES

12
New cards

international data encryption algorithm (IDEA)

symmetric block cipher with a 64 bit block size to encrypt plaintext into ciphertext

  • 128 bit key size

13
New cards

advanced encryption standard (AES)

symmetric block cipher that uses 128, 192, or 256 bit block size to encrypt plaintext into ciphertext

  • replaced DES and 3DES as US govt encryption standard

14
New cards

blowfish

symmetric block cipher that uses 64 bit blocks and a variable length encryption key to encrypt plaintext into ciphertext

  • key sizes range from 32-448 bits

15
New cards

twofish

open source symmetric block cipher supporting 128 bit blocks in its encryption algorithm and uses 128, 192, or 256 bit encryption keys

16
New cards

RC cipher suite (Rivest Cipher)

created by Ron RIvest

originally 6 but only 3 were released and used

  • RC4

  • RC5

  • RC6

17
New cards

RC4

symmetric stream cipher with variable key sizes from 40-2048

  • used in SSL and WEP

18
New cards

RC5

block cipher with key sizes up to 2048 bits

19
New cards

RC6

based on RC5 and was co sidered as a DES replacement

20
New cards

digital signature

hash digest of a message encrypted with the sender’s private key to let the recipient know the document was created and ent by the person claiming to have sent it

21
New cards

diffie-hellman (DH)

asymmetric alogrithm used to conduct key exchanges and secure key distribution over an unsecure network

  • commonly used in VPN tunnel establishment (IPSec)

  • vulnerable to man-in-the-middle attacks

22
New cards

RSA

asymmetric algorithm that relies on the mathematical difficulty of factoring large prime numbers

  • used for key exchange, encryption, and digital signatures

  • one time use keys (MFA)

23
New cards

elliptic curve cryptography (ECC)

heavily used in mobile and low-power computing devices and it’s based on the algebraic structure of elliptical curves over finite fields to define its keys

24
New cards

ECC variants

  • ECDH (elliptic curve diffie-hellman)

  • ECDHE (elliptic curve diffie-hellman ephermeral)

  • ECDSA (elliptic curve digital signature algorithm)

25
New cards

hash digest

fixed-length digital fingerprint for the original data

26
New cards

common hashing algorithms

  • MD5

  • SHA family (1, 2, 3)

  • RIPEMD

  • HMAC

27
New cards

MD5

creates a 128 bit hash value that is unique to the input file

-limited unique values, leading to collisions (same hash digest values)

28
New cards

SHA-1

produces a 160-bit hash digest, less prone to collisions than MD5

29
New cards

SHA-2

offers longer hash digests

  • SHA-224, 256, 384, 512

30
New cards

SHA-3

uses 224-512 bit hash digests with 120 rounds of comptuations

  • more secure

31
New cards

RACE integrity primitive evaluation message digest (RIPEMD)

open source competitor to SHA but less popular

  • 160 (most coomon), 256, and 320 bit versions

32
New cards

hash based message authentication code (HMAC)

used to check the integrity oif a message and provides some level of assurance that its authenticity is real

  • pairs with other algos

    • HMAC-MD5, HMAC-SHA256

33
New cards

digital security standard (DSS)

relies upon a 160 bit message digest created by the Digital Security Algorithm

34
New cards

2 common types of hashing attacks

  1. pass the hash attack

  2. birthday attack

35
New cards

pass the hash attack

hacking technique that allows the attacker to authenticate to a remote server or service by using the underlying hash of a user’s password instead of requiring the associated plaintext password

36
New cards

mimikatz

provides the ability to automate the process of harvesting the hashes and conducting the attack

37
New cards

birthday attack

occurs when two different messages result in the same hash digest (collison)

  • collisons can be exploited by attackers to bypass authentication systems

38
New cards

methods to increase hash security

  • key stretching

  • salting

  • nonces

  • limiting failed login attempts

39
New cards

key stretching

technique used to mitigate a weaker key bycreating longer and more secure keys in order to increase the time needed to crack it

40
New cards

salting

adding random data into a one-way cryptographic hash to help protect against password cracking techniques

  • protects against dictionary, brute force, and drainbow table attacks

41
New cards

dictionary attack

when an attacker tries every word from a predefined list

42
New cards

brute force attack

when an attacker tries every possible password combo

43
New cards

rainbow table attack

precomputed tables for reversing cryptographic hash functions

44
New cards

nonce

“number used once”

a unique, often random number that is added to password-based authentication process

  • prevents attackers from reusing stolen authentication data

45
New cards

public key infrastructure (PKI)

an entire system of hardware, software, policies, procedures, and people that is based on asymmetric encryption

  • facilitates secure data transfer, authentication, and encrypted communication

46
New cards

PKI vs public key cryptography

encompasses entire system vs the encryption/decryption process using public and private keys

  • public key cyrptography is only a part of the overall PKI architecture

47
New cards

certificate authority

issues digital certificates and keeps the level of trust between all of the certificate authorities around the world

48
New cards

key escrow

process where cryptographic keys are stored in a secure, third-party location (escrow)

49
New cards

digital certificate

digitally signed electronic document that binds a public key with a user’s identity

50
New cards

X.509 standard

commonly used standard for digital certs within PKI and contains owner/user’s info and cert authority details

51
New cards

wildcard certificates

allows all of the subdomains to use the same public key cer and have it displayed as valid

52
New cards

subject alternate name SAN field

cert that specifies what additional domains and IP addresses are going to be supported

53
New cards

single-sided certificate

only requres the server to be validated

54
New cards

dual-sided certificate

requires both the server and the user to be validated

  • used in high security environments

55
New cards

self-signed certificate

digitial cer that is signed by the same entity whose identity it certifies

56
New cards

third-party certificate

digital cert issued and signed by a trusted certificate authority (CA)

57
New cards

root of trust (chain of trust)

each cert is validated using this concept

  • highest level of trust in cert validation

58
New cards

certificate authority

trusted third party who is going to issue the digital certs

59
New cards

regristration authority

requests identifying info from the user and forwards that certificate request up to the certificate authority to create the digital certificate

60
New cards

certificate signing request

a block of encoded text that contains info about the entity requesting the certificate

61
New cards

certificate revocation list

online list of digital certs that the cert authority has already revoked

62
New cards

OCSP

determines cert revocation status or any digital cert using the cert’s serial number

63
New cards

OCSP stapling

allows the cert holder to get the OCSP record from the server at regular intervals

64
New cards

public key pinning

allows an HTTPS website to resist impersonation attacks from users who are trying to present fraudulent certs

65
New cards

key recovery agent

specialized software that allows the restoration of a lost or corrupted key to be performed

66
New cards

blockchain

a shared immutable ledger for recording transactions, tracking assets, and building trust

67
New cards

public ledger

record keeping system that maintains participants’ identities in a secure and anonymous format

68
New cards

smart contracts

self executing contracts where terms of agreement or conditions are written directly into lines of code

69
New cards

permissioned blockchain

used fir business transactions and it promotes new levels of trust and transparency using public ledgers

70
New cards

encryption tools to protect enterprise networks and systems

  • TPM

  • HSM

  • key management systems

  • secure enclave

71
New cards

trusted platform module (TPM)

dedicated microcontroller designed to secure hardware through integrated cryptographic keys

72
New cards

hardware security module (HSM)

physical device that safeguards and manages digital keys, primarily used for mission critical situations like financial transactions

73
New cards

key management system

generating, distributing, and managing cryptographic keys for devices and applications

74
New cards

secure enclave

co-processor integrated into the main processor of some devices, designed with the sole purpose of ensuring data protection

75
New cards

types cryptographic attacks

  1. downgrade

  2. collison

  3. quantum computing

76
New cards

downgrade attack

aims to force a system into using a weaker or older cryptographic standard or protocol than what it is currently using

77
New cards

post-quantum cryptography

new kind of cryptographic algorithm that can be implemented using today’s classical computers but is also impervious to attacks from future quantum computers

78
New cards

NIST selected 4 post quantum cryptography standards

CRYSTALS-Kyber algorithm

digital signatures:

  • CRYSTALS-Dilithium

  • FALCON

  • SPHINCS+ (hashing)