Section 9: Key Management

0.0(0)
Studied by 0 people
call kaiCall Kai
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
GameKnowt Play
Card Sorting

1/18

encourage image

There's no tags or description

Looks like no tags are added yet.

Last updated 8:33 PM on 3/29/26
Name
Mastery
Learn
Test
Matching
Spaced
Call with Kai

No analytics yet

Send a link to your students to track their progress

19 Terms

1
New cards

Symmetric algorithms depend upon

shared secret keys

2
New cards

Out-of-Bound Key Exchange

use a different channel to properly share secret keys

3
New cards

Out-of-Bound Key Exchange Options

  • Face to face meetings

  • Physical Mail

  • telephone call

4
New cards

In-band Key Exchange

securely exchange keys digitally

5
New cards

Diffie-Hellman Algorithm

provides symmetric key capability based upon the work of Ralph Merkle

6
New cards

p and g must be large values to achieve strong security in Diffie-Hellman

True

7
New cards

Encryption key Escrow

allows government access to keys

8
New cards

Recovery Agents

allow internal access to lost keys

9
New cards

Key Stretching

takes relatively insecure value, such as a password, and uses mathematical techniques to strengthen it, making it harder to crack

10
New cards

Salting

adds a value to the encryption key to make it more complex

11
New cards

Hashing

adds time to the verification process by requiring more math

12
New cards

Password-Based Key Derivation Function v2

uses salting and hashing to stretch a key (should be used at least 4000 times)

13
New cards

bcrypt

algorithm based upon the blowfish cipher; it uses blowfish hashing approach combined with salt to strengthen keys

14
New cards

Hardware Security Modules (HSMs)

manage encryption keys and perform cryptographic operations

15
New cards

FIPS 140-2 Security Levels

works/applies when using government data

16
New cards

Security Level 1

standard operating systems; no physical security

17
New cards

Security Level 2

EAL2 software and firmware; tamper-evident seals

18
New cards

Security Level 3

EAL3 software and firmware; tamper resistant controls

19
New cards

Security Level 4

EAL4 software and firmware; strict physical security

Explore top notes

note
AP Gov: Chapter 1 Vocab
Updated 1299d ago
0.0(0)
note
Unit 7: Evolution (Biology)
Updated 710d ago
0.0(0)
note
Mitosis
Updated 751d ago
0.0(0)
note
diplomacy
Updated 1251d ago
0.0(0)
note
Le Chatelier's Principle
Updated 1158d ago
0.0(0)
note
AP Gov: Chapter 1 Vocab
Updated 1299d ago
0.0(0)
note
Unit 7: Evolution (Biology)
Updated 710d ago
0.0(0)
note
Mitosis
Updated 751d ago
0.0(0)
note
diplomacy
Updated 1251d ago
0.0(0)
note
Le Chatelier's Principle
Updated 1158d ago
0.0(0)

Explore top flashcards

flashcards
Kite Runners Vocab
35
Updated 68d ago
0.0(0)
flashcards
Midterm
238
Updated 389d ago
0.0(0)
flashcards
Describing People SPN2 PreAP
91
Updated 221d ago
0.0(0)
flashcards
Cellular Respiration Review
22
Updated 1215d ago
0.0(0)
flashcards
apush 3.1-3.4
52
Updated 578d ago
0.0(0)
flashcards
Chapter 9 Med Term
25
Updated 1217d ago
0.0(0)
flashcards
Posterior Muscles
47
Updated 1244d ago
0.0(0)
flashcards
SALUD Y BIENESTAR vocabulario
33
Updated 913d ago
0.0(0)
flashcards
Kite Runners Vocab
35
Updated 68d ago
0.0(0)
flashcards
Midterm
238
Updated 389d ago
0.0(0)
flashcards
Describing People SPN2 PreAP
91
Updated 221d ago
0.0(0)
flashcards
Cellular Respiration Review
22
Updated 1215d ago
0.0(0)
flashcards
apush 3.1-3.4
52
Updated 578d ago
0.0(0)
flashcards
Chapter 9 Med Term
25
Updated 1217d ago
0.0(0)
flashcards
Posterior Muscles
47
Updated 1244d ago
0.0(0)
flashcards
SALUD Y BIENESTAR vocabulario
33
Updated 913d ago
0.0(0)