Domain 5 : Cryptography

0.0(0)
studied byStudied by 0 people
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/55

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

56 Terms

1
New cards

Confidentiality

Ensures data is only accessible to authorized parties; achieved through encryption and access control.

2
New cards

Integrity

Guarantees that data has not been altered; verified with hashing, HMACs, and digital signatures.

3
New cards

Authenticity

Confirms the identity of the sender or system; uses digital certificates and authentication protocols.

4
New cards

Non-repudiation

Ensures actions cannot be denied later; achieved through digital signatures, HMAC, and audit trails.

5
New cards

PII (Personally Identifiable Information)

Data that can identify a person, such as name, SSN, or email.

6
New cards

PHI (Protected Health Information)

Health-related personal information protected under HIPAA.

7
New cards

IP (Intellectual Property)

Proprietary data such as designs, source code, or trade secrets that require confidentiality.

8
New cards

Hashing

A one-way function that converts data into a fixed-length string for verifying data integrity.

9
New cards

Salting

Adding random data to passwords before hashing to defeat rainbow table attacks.

10
New cards

Symmetric Encryption

Uses the same key to encrypt and decrypt data; faster but harder to scale securely.

11
New cards

Asymmetric Encryption

Uses a public/private key pair; enables secure key exchange and digital signatures.

12
New cards

ECC (Elliptic Curve Cryptography)

A lightweight asymmetric algorithm that offers strong encryption with smaller key sizes.

13
New cards

AES (Advanced Encryption Standard)

A symmetric block cipher standard commonly used for data at rest; strong and efficient.

14
New cards

RSA (Rivest-Shamir-Adleman)

A widely used asymmetric algorithm used for encryption and digital signatures.

15
New cards

HMAC (Hash-based Message Authentication Code)

Combines a shared secret with a hash function to verify message integrity and authenticity.

16
New cards

Digital Signature

A cryptographic method for verifying identity and message integrity using private/public key pairs.

17
New cards

TLS (Transport Layer Security)

A protocol used to encrypt data in transit, especially in web browsers and email.

18
New cards

IPsec (Internet Protocol Security)

A protocol suite used to secure network communication at the IP layer.

19
New cards

ESP (Encapsulating Security Payload)

IPsec protocol providing confidentiality through encryption.

20
New cards

AH (Authentication Header)

IPsec protocol providing integrity and authentication without encryption.

21
New cards

PGP (Pretty Good Privacy)

A tool that uses public-key cryptography to secure email communication.

22
New cards

Rainbow Table Attack

A precomputed table of hashes used to reverse unsalted password hashes.

23
New cards

Salting vs Hashing

Hashing is one-way; salting adds uniqueness to each hash to prevent reverse lookup attacks.

24
New cards

Certificate Authority (CA)

A trusted third party that issues and verifies digital certificates in a PKI.

25
New cards

Public Key Infrastructure (PKI)

A system that manages digital certificates and public-key encryption.

26
New cards

Key Revocation

The process of invalidating a certificate before its expiration; managed via CRL or OCSP.

27
New cards

Web of Trust

A decentralized trust model used in PGP and GPG instead of a central authority.

28
New cards

Forward Secrecy

A feature of secure protocols where each session uses a unique ephemeral key, preventing compromise of past sessions.

29
New cards

Key Escrow

A process where a third party securely stores encryption keys for recovery or legal access.

30
New cards

SHA1

Secure hash algorithm producing a 160-bit digest; now considered weak for collision resistance.

31
New cards

MD5

A legacy hashing algorithm producing a 128-bit hash; vulnerable to collisions and not secure.

32
New cards

Key Management Lifecycle

Includes generation, storage, distribution, rotation, revocation, and destruction of keys.

33
New cards

Quantum Cryptography

A field using quantum mechanics for secure key distribution and ultra-strong entropy.

34
New cards

PCI-DSS

A compliance standard that requires strong encryption (TLS, AES) when transmitting or storing credit card data.

35
New cards

ISO 27001

An international security framework that outlines best practices for cryptographic controls and key management.

36
New cards

Entropy

In cryptography, the amount of randomness used to generate secure keys; high entropy means better security.

37
New cards

Quantum Key Distribution

A cryptographic method using quantum mechanics to securely exchange keys with guaranteed detection of eavesdropping.

38
New cards

Cryptanalysis

The process of attempting to break cryptographic algorithms through analysis of ciphertexts and key weaknesses.

39
New cards

Man-in-the-Middle (MITM) Attack

An attack where the adversary intercepts and possibly alters communication between two parties.

40
New cards

Brute Force Attack

An attack that tries all possible key combinations until the correct one is found.

41
New cards

Downgrade Attack

An attack that forces a system to use a weaker, outdated cryptographic protocol or cipher.

42
New cards

WPA2-Enterprise

Wi-Fi encryption standard that uses 802.1X and RADIUS server for authentication.

43
New cards

WPA3

A newer wireless standard offering stronger encryption and protection from dictionary attacks.

44
New cards

RADIUS (Remote Authentication Dial-In User Service)

A protocol used for centralized authentication, often in enterprise WPA2/WPA3 wireless networks.

45
New cards

SFTP (Secure File Transfer Protocol)

A secure version of FTP that runs over SSH to encrypt data in transit.

46
New cards

FTPS (FTP Secure)

A version of FTP that uses TLS for encryption; often used in secure file transfers.

47
New cards

TLS 1.0/1.1

Deprecated versions of TLS with known vulnerabilities; must be disabled in favor of TLS 1.2+.

48
New cards

Initialization Vector (IV)

Random value used to ensure the same plaintext encrypts differently each time; prevents pattern analysis.

49
New cards

Audit Trail

A secure, chronological log that supports non-repudiation and incident investigation.

50
New cards

OCSP (Online Certificate Status Protocol)

A real-time protocol for checking if a certificate has been revoked.

51
New cards

CRL (Certificate Revocation List)

A list published by a certificate authority containing revoked certificate serial numbers.

52
New cards

Block Cipher

Encrypts data in fixed-size blocks (e.g., AES-128); more secure with proper mode and padding.

53
New cards

Stream Cipher

Encrypts data one bit or byte at a time (e.g., RC4); useful for real-time applications but less common now.

54
New cards

RC4

A deprecated stream cipher with known vulnerabilities; should not be used.

55
New cards

Perfect Forward Secrecy

A property that ensures session keys cannot be recovered even if long-term keys are compromised.

56
New cards