1.4 Cryptographic Solutions

0.0(0)
studied byStudied by 0 people
0.0(0)
full-widthCall Kai
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
GameKnowt Play
Card Sorting

1/31

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

32 Terms

1
New cards

PKI (Public Key Infrastructure)

๐Ÿ› The entire system (hardware, software, Certificate Authorities - CAs) used to create, manage, and distribute digital certificates.

<p><span data-name="classical_building" data-type="emoji">๐Ÿ›</span> The <em>entire system</em> (hardware, software, <strong>Certificate Authorities - CAs</strong>) used to create, manage, and distribute digital certificates.</p>
2
New cards

Digital Certificate

๐Ÿ’ณ A driver's license for the internet. Proves identity and contains a public key. (Issued by a CA).

<p><span data-name="credit_card" data-type="emoji">๐Ÿ’ณ</span> A <em>driver's license</em> for the internet. Proves identity and contains a <strong>public key</strong>. (Issued by a CA).</p>
3
New cards

Encryption

๐Ÿ”’ Scrambling data so it's unreadable (ciphertext). Reversible with the correct key. (Provides Confidentiality)

<p><span data-name="lock" data-type="emoji">๐Ÿ”’</span> <em>Scrambling</em> data so it's unreadable (ciphertext). <strong>Reversible</strong> with the correct key. (Provides <strong>Confidentiality</strong>)</p>
4
New cards

Hashing

๐Ÿ’ฏ Fingerprinting data. Creates a fixed-length, unique string. One-way (irreversible). (Provides Integrity)

<p><span data-name="100" data-type="emoji">๐Ÿ’ฏ</span> <em>Fingerprinting</em> data. Creates a fixed-length, unique string. <strong>One-way</strong> (irreversible). (Provides <strong>Integrity</strong>)</p>
5
New cards

Obfuscation

๐ŸŽญ Hiding data to make it confusing or unreadable, but not securely. (e.g., Base64). Not a substitute for encryption.

<p><span data-name="performing_arts" data-type="emoji">๐ŸŽญ</span> <em>Hiding</em> data to make it confusing or unreadable, but <em>not</em> securely. (e.g., Base64). <strong>Not</strong> a substitute for encryption.</p>
6
New cards

Digital Signature

โœ Provides Integrity + Authentication + Non-repudiation. (Created by hashing a message and then encrypting the hash with your private key).

<p><span data-name="writing_hand" data-type="emoji">โœ</span> Provides <strong>Integrity</strong> + <strong>Authentication</strong> + <strong>Non-repudiation</strong>. (Created by <em>hashing</em> a message and then <em>encrypting</em> the hash with your <strong>private key</strong>).</p>
7
New cards

Blockchain

A decentralized, distributed, and immutable (unchangeable) digital ledger. (Provides high Integrity).

<p>A decentralized, distributed, and <strong>immutable</strong> (unchangeable) digital ledger. (Provides high <strong>Integrity</strong>).</p>
8
New cards

Steganography

๐Ÿ–ผ Hiding data inside another file. (e.g., a secret message hidden in a JPG image).

9
New cards

Key Escrow

๐Ÿฆ Giving a spare key to a trusted third party. Used for legal/recovery access.

<p><span data-name="bank" data-type="emoji">๐Ÿฆ</span> Giving a <em>spare key</em> to a trusted third party. Used for legal/recovery access.</p>
10
New cards

Secure Enclave

๐Ÿ“ฑ A security chip in a CPU (like Apple's M-series). Manages keys for biometrics (Face ID) and payments.

<p><span data-name="android" data-type="emoji">๐Ÿ“ฑ</span> A security chip in a <strong>CPU</strong> (like Apple's M-series). Manages keys for biometrics (Face ID) and payments.</p>
11
New cards

Tokenization

๐ŸŽŸ Replacing sensitive data with a non-sensitive placeholder (a "token"). (e.g., ...1234 becomes tok_ABC). (Used in PCI-DSS).

<p><span data-name="admission_tickets" data-type="emoji">๐ŸŽŸ</span> Replacing sensitive data with a <em>non-sensitive placeholder</em> (a "token"). (e.g., <code>...1234</code> becomes <code>tok_ABC</code>). (Used in <strong>PCI-DSS</strong>).</p>
12
New cards

Data Masking

๐Ÿ™ˆ Hiding part of a data field. (e.g., ***-**-1234 or john.s****@email.com).

<p><span data-name="see_no_evil" data-type="emoji">๐Ÿ™ˆ</span> Hiding <em>part</em> of a data field. (e.g., <code>***-**-1234</code> or <code>john.s****@email.com</code>).</p>
13
New cards

Wildcard Certificate

A certificate for *.domain.com. Secures all subdomains at one level. (e.g., mail.google.com, drive.google.com).

<p>A certificate for <code>*.domain.com</code>. Secures <em>all</em> subdomains at one level. (e.g., <code>mail.google.com</code>, <code>drive.google.com</code>).</p>
14
New cards

Certificate Revocation List (CRL)

๐Ÿšซ A downloaded list of bad/invalid certs. (Problem: Not instant, can be outdated).

<p><span data-name="no_entry_sign" data-type="emoji">๐Ÿšซ</span> A <em>downloaded list</em> of bad/invalid certs. (Problem: Not instant, can be outdated).</p>
15
New cards

OCSP (Online Certificate Status Protocol)

๐Ÿ“ž A live check. Asks the CA "Is this cert (Serial #123) good right now?" (Faster than CRL).

<p><span data-name="telephone_receiver" data-type="emoji">๐Ÿ“ž</span> A <em>live check</em>. Asks the CA "Is this cert (Serial #123) good <em>right now</em>?" (Faster than CRL).</p>
16
New cards

Root of Trust

The ultimate CA (e.g., DigiCert). The browser trusts this implicitly.

<p>The <em>ultimate</em> CA (e.g., DigiCert). The browser trusts this <em>implicitly</em>.</p>
17
New cards

Self-Signed Certificate

A "homemade" certificate. Good for internal testing, but browsers do not trust it (shows a warning).

<p>A "homemade" certificate. Good for internal testing, but browsers <strong>do not trust it</strong> (shows a warning).</p>
18
New cards

Third Party Certificate

A "real" certificate issued by a trusted public CA. (Required for public-facing websites).

<p>A "real" certificate issued by a trusted public CA. (Required for public-facing websites).</p>
19
New cards

Salting

๐Ÿง‚ Adding random data to a password before hashing it. (Defeats rainbow table attacks).

<p><span data-name="salt" data-type="emoji">๐Ÿง‚</span> Adding <em>random data</em> to a password <em>before</em> hashing it. (Defeats <strong>rainbow table</strong> attacks).</p>
20
New cards

Key Stretching

๐Ÿƒ A slow hashing algorithm (e.g., PBKDF2, bcrypt). Makes brute-force attacks much harder and slower.

21
New cards

Key Exchange

๐Ÿค The process of securely sending a symmetric key to someone, usually by encrypting it with their public key. (e.g., Diffie-Hellman)

22
New cards

Asymmetric Encryption

๐Ÿ— Two keys (a "key pair"). (Analogy: Mailbox). Slow. (e.g., RSA)

23
New cards

Symmetric Encryption

๐Ÿ”‘ One key (a "shared secret") is used to both encrypt and decrypt. (Analogy: House key). Very fast.

24
New cards

Key Management System (KMS)

๐Ÿ—„ The software that manages the entire lifecycle of keys (creation, storage, rotation, destruction).

25
New cards

TPM (Trusted Platform Module)

๐Ÿ’ป A security chip on a motherboard. Stores keys, handles disk encryption (BitLocker), and provides secure boot.

26
New cards

HSM

๐Ÿ”’ A high-security appliance or card (a "key safe"). Manages keys for servers (e.g., a CA server, a database).

27
New cards

Transport Encryption

Encrypts data in-transit (over the network). (e.g., TLS, HTTPS, VPN).

28
New cards

FDE (Full Disk Encryption)

Encrypts the entire drive, including the OS. (e.g., BitLocker, FileVault). Protects data when the system is powered off.

29
New cards

Partition/Volume Encryption

Encrypts a specific section (logical drive, e.g., "D:") of a disk.

30
New cards

File Encryption

Encrypts individual files. Allows different users on the same system to have separate encrypted files. (e.g., EFS)

31
New cards

Database Encryption

Encrypts the entire database file (at rest).

32
New cards

Record Encryption

Encrypts specific entries (rows or fields) in a database. (e.g., only the credit card number column).