Module 4 - Advanced Cryptography and PKI

0.0(0)
studied byStudied by 0 people
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/57

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

58 Terms

1
New cards

block cipher mode of operation

a process that specifies how block ciphers should handle plaintext

2
New cards

Electronic Code Book (ECB)

a process in which plaintext is divided into blocks and each block is then encrypted separately, not suitable for use, less secure

3
New cards

Cipher Block Chaining (CBC)

a process in which each block of plaintext is XORed with the previous block of ciphertext before being encrypted, more secure

4
New cards

Counter (CTR)

a process in which both the message sender and receiver access a counter, which computes a new value each time a ciphertext block is exchanged

5
New cards

Galois/Counter (GCM)

a process that both encrypts and computes a message authentication code (MAC)

6
New cards

crypto service provider

a service used by an application to implement cryptography

7
New cards

salt

a value that can be used to ensure that plaintext, when hashed, will not consistently result in the same digest

8
New cards

nonce

a value that must be unique within some specified scope

9
New cards

initialization vector (IV)

a nonce that is selected in a non-predictable way

10
New cards

digital certificate

a technology used to associate a user's identity to a public key and that has been digitally signed by a trusted third party, X509 certificate

11
New cards

Certificate Signing Request (CSR)

a user request for a digital certificate

12
New cards

intermediate certificate authority

an entity that processes the CSR and verifies the authenticity of the user on behalf of a CA

13
New cards

certificate authority (CA)

the entity that is responsible for digital certificates

14
New cards

offline CA

a certificate authority that is not directly connected to a network

15
New cards

online CA

a certificate authority that is directly connected to a network

16
New cards

Certificate Revocation List (CRL)

a list of certificate serial numbers that have been revoked

17
New cards

Online Certificate Status Protocol (OCSP)

a process that performs a real-time lookup of a certificate's status

18
New cards

stapling

a process for verifying the status of a certificate by sending queries at regular intervals to receive a signed time-stamped response, uses OCSP

19
New cards

certificate chaining

linking several certificates together to establish trust between all the certificates involved

20
New cards

user digital certificate

the end-point of the certificate chain

21
New cards

root digital certificate

a certificate that is created and verified by a CA, trust anchor

22
New cards

self-signed

a signed digital certificate that does not depend upon any higher level authority for authentication, most cost-effective

23
New cards

pinning

hard-coding a digital certificate within a program that is using the certificate, prevents SSL man-in-the-middle attacks

24
New cards

session keys

symmetric keys used to encrypt and decrypt information exchanged during the session and to verify its integrity

25
New cards

domain validation digital certificate

certificate that verifies the identity of the entity that has control over the domain name

26
New cards

Extended Validation (EV) certificate

certificate that requires more extensive verification of the legitimacy of the business

27
New cards

wildcard digital certificate

certificate used to validate a main domain along with all subdomains

28
New cards

Subject Alternative Name (SAN)

certificate primarily used for Microsoft Exchange servers or unified communications

29
New cards

machine digital certificate

certificate used to verify the identity of a device in a network transaction

30
New cards

code signing digital certificate

certificate used by software developers to digitally sign a program

31
New cards

email digital certificate

a certificate that allows a user to digitally sign and encrypt mail messages

32
New cards

CER/DER (Canonical/Distinguished Encoding Rules)

X.509 encoding formats

33
New cards

Privacy Enhancement Mail (PEM)

an X.509 file format that uses DER encoding and can have multiple certificates

34
New cards

Personal Information Exchange (PFX)

an X.509 file format that is the preferred file format for creating certificates to authenticate applications or websites

35
New cards

PKCS#12

an X.509 file format that is one of a numbered set of 15 standards defined by RSA Corporation

36
New cards

Public key infrastructure (PKI)

the underlying infrastructure for the management of public keys used in digital certificates

37
New cards

object identifier (OID)

a designator made up of a series of numbers separated with a dot which names an object or entity

38
New cards

key escrow

a process in which keys are managed by a third party, such as a trusted CA

39
New cards

Secure Sockets Layer (SSL)

an early and widespread cryptographic transport algorithm; now considered obsolete

40
New cards

Transport Layer Security (TLS)

a widespread cryptographic transport algorithm, current versions v1.1 and v1.2 are considered secure

41
New cards

Secure Shell (SSH)

an encrypted alternative to the Telnet protocol that is used to access remote computers

42
New cards

Hypertext Transport Protocol Secure (HTTPS)

HTTP sent over SSL or TLS, uses port 443

43
New cards

Secure/Multipurpose Internet Mail Extensions (S/MIME)

a protocol for securing email messages

44
New cards

Secure Real-time Transport Protocol (SRTP)

a protocol for providing protection for Voice over IP (VoIP) communications

45
New cards

Internet Protocol Security (IPsec)

a protocol suite for securing Internet Protocol (IP) communications

46
New cards

Authentication Header (AH)

an IPsec protocol that authenticates that packets received were sent from the source

47
New cards

Encapsulating Security Payload (ESP)

an IPsec protocol that encrypts packets

48
New cards

transport mode

an IPsec mode that encrypts only the data portion (pay-load) of each packet yet leaves the header unencrypted

49
New cards

tunnel mode

an IPsec mode that encrypts both the header and the data portion

50
New cards

X509 certificates

a standard defining the format of public-key certificates

51
New cards

Registration Authority (RA)

validates and accepts the incoming requests for certificates from users on the network and notifies the CA to issue the certificates

52
New cards

Data Recovery Agent (DRA)

can recover the data if a user's private key is corrupted, retrieves from key escrow

53
New cards

superposition

bits can be switched on or off at the same time or somewhere in between

54
New cards

Pseudo-Random Number Generator (PRNG)

an algorithm that uses mathematical formulas to produce sequences of random numbers

55
New cards

P12

private certificate, file extension .pfx

56
New cards

P7B

public certificate, file extension .cer

57
New cards

Base 64 format

PEM certificate, file extension .pem

58
New cards

Extension for PEM

DER certificate, file extension .der