1/38
Looks like no tags are added yet.
Name | Mastery | Learn | Test | Matching | Spaced |
|---|
No study sessions yet.
Asymmetric encryption
Uses two keys for encryption/decryption
Symmetric encryption
Uses one key for encryption/decryption
Types of Symmetric Algorithms:
DES
3DES
AES
Blowfish and Twofish
Rivest Ciphers(RC4, RC5, RC6)
DES
Symmetric encryption
3DES
Symmetric encryption
IDEA
Symmetric encryption
AES
Symmetric encryption
Blowfish and Twofish
Symmetric encryption
Digital signature
sender’s private key for non-repudiation and integrity
Types of Asymmetric Algorithms:
Diffie-Helman(DH)
RSA
Elliptic Curve Cryptography(ECC)
Diffie-Hellman(DH)
Asymmetric algorithm, for networks
RSA
Relies on large prime number factoring
Elliptic Curve Cryptography(ECC)
For mobile and low-power devices
Types of Hash Functions
MD5
Secure Hash Algorithm(SHA) Family
RIPEMD
HMAC
Secure Hash Algorithm(SHA) Family
Asymmetric algorithm that is known for its security
Code signing
Using hash keys to show a file is unmodified
Collision
When two has inputs have the same output
Hashing
One-way encryption that produces a key based on input
Pass the Hash attack
Uses hash keys to gain authentication
Birthday attack
Aims to get hash key collisions
Key stretching
Increasing the strength of weaker keys
Salting
Adding random data to hash keys
Rainbow tables
Pre-computed tables for cracking hash keys
Nonce
Number used once. Dynamic numbers added to hash keys for security
Defences against hash attacks:
Key stretching
Nonces(Number used once)
Limiting failed login attempts
Public Key infrastructure(PKI)
System of asymmetric encryption
OCSP
List of revoked certificates using serial numbersBlock
Blockchain
Ledger for tracking all communications/transactions
Trusted platform module
Secures hardware through cryptographic keys
Hardware security model
Physical device that safeguards and manages digital keys
Secure Enclave
Ensures data protection, located separately from main processor
Types of Obfuscation
Steganography
Tokenization
Data Masking
Steganography
Hiding secrete messages in another message
Tokenization
Substituting sensitive data with non-sensitive tokens
Types of cryptographic attacks
Downgrade attacks
Collision Attacks
Quantum computingC
Downgrade attacks
Aims to force a system to use older and weaker security protocols
Collision attacks
Aims to find two different inputs that produces the same hash output
Quantum computing
Utilizes quantum bits for enormous processing power
Post-quantum cryptography
Encryption techniques that are resistant to quantum computing