Chapter 2

0.0(0)
studied byStudied by 0 people
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/73

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

74 Terms

1
New cards

What does CIA confidentiality ensure?

Only authorized parties can access sensitive information

2
New cards

What are 2 ways to enforces confidentiality?

Deny read and encryption

3
New cards

What dees CIA integrity ensure?

The data has not been modified in an unauthorized way.

4
New cards

What are two ways to maintain integrity?

Deny write access and use of hashing

5
New cards

What does CIA availability ensure?

Maintaining access to an object when need of access

6
New cards

What is disclosure?

When confidentiality has been compromised

7
New cards

Who takes disclosure very serious

Governments place heavy emphasis on confidentiality

8
New cards

What is tampering

When integrity has been compromised and object is no longer trustworthy

9
New cards

What is the data state model?

  1. Data in transit

  2. Data at rest

  3. Data in use

10
New cards

4 security goals of cryptography

  1. Confidentiality -only authorized parties can read data

  2. Integrity- verifying data has not been altered

  3. Authentication - verifying a source is who they say they are 4. Non-repudiation - prevents someone from denying their actions

11
New cards

What is a PRNG

Pseudo-random number generator

A program or function that can produce a random number that can strengthen encryption or authentication

12
New cards

What is an IV

Initialization vector

A random rate created by a RNG or PRNG used before encryption process is finalized to prevent repetition and patterns

13
New cards

What is a nonce

A number used once with often with network based authentication protocols

14
New cards

What is a salt?

A random number added to a password before encryption to create a password hash

15
New cards

What is a password hash?

Transforms password into scrambled unreadable string that can't be reversed

16
New cards

What is PFS

Perfect forward secrecy - a security goal of protecting communication data during and after the session

17
New cards

What should be avoided to achieve PFS

Avoid static keys and predictable keys

18
New cards
19
New cards

What is an ephemeral key

A temporary key used for a current conversation and discarded when conversation is ended

20
New cards

General rule for key length

The size of an encryption key is proportional to its ability to resist brute-force attack. Positive and negative effect

21
New cards

What are key stretching protocols

Lengthen a key or password to make it more resistant to attacks

22
New cards

Examples of key stretching

PBKDF2 (password-based key derived function2) to protect password bcrypt() used by Linux to salt password before encryption and store in shadow file

23
New cards

What is steganography

Concealing a message within some other data object ( weaker form of confidentiality compared tocrypt ography)

24
New cards

Where is steganography used?

• Convert channel and digital rights management and meta data

25
New cards

What is obfuscation

Disguises computer code or data so its meaning isn't obvious.

26
New cards

What ave some examples of obfuscation

Encoding data with rot 13 shift cipher or using exclusive - OR logic on data

27
New cards

What are the 3 different encryption ciphers

Lightweight cryptography, stream and block

28
New cards

What is the light weight cryptography cipher

Algorithm designed to be efficient on resource - constrained device (RFID chips or IOT firmware) - these devices operate without power cable

29
New cards

Why is lightweight cryptography good?

Using other traditional asymmetric cryptographic algorithms would drain battery too quickly

30
New cards

What is a stream cipher?

Speedy and simple way of encrypting data one bit or byte at a time and does not require significant resources. (RC4)

31
New cards

What is a block cipher?

A method of encrypting data to a block once as a group needs more resources but stronger than stream.

32
New cards

What is hashing?

Performing calculation on a message and converting it into a numeric hash value, it establishes message integrity

33
New cards

What is impossible with hashing and why?

Decryption is not possible because it doesn't use a key

34
New cards

What is a hashing collision?

2 different hashing inputs van through same hash function create the same hash value

35
New cards

What is MAC

Message authentication code- authenticates integrity and authenticity of a message. ( data integrityand origin)

36
New cards

What is HMAC

Hashed message authentication code - a type of MAC using a specific hashed function with a secret key - the shared key is appended to the data to be hashed

37
New cards

What are symmetric algorithms?

Require both ends of a encrypted message to have same key and same algorithms

38
New cards

What is a symmetric key?

A key not disclosed to those who aren't authorized to the encryption system - if a key is lost the entire cryptosystem is breached

39
New cards

What are some advantages of symmetric cryptography

  • Less computationally intensive

  • Produces smaller file size

  • Allows faster transmissions

40
New cards

What are disadvantages of symmetric cryptography

  • Lacks “ non- repudiation “

  • Is there trust between the parties

  • Secure communications between n people means a total of n (n-i)/2 keys are needed and how do we exchange keys securely

41
New cards

what do cipher modes of operation do?

provide an organized way for managing encryption keys, IVs, and the plaintext data as block cipher performs encryption

42
New cards

what are the different cipher modes

CBC cipher block chaining

CTR counter mode

GCM Galois counter mode

CCM Counter by CBC-MAC

43
New cards

what is CBC

a cipher mode that provides confidentiality for anything from files to wireless frames and hard dives. it is unauthenticated and uses an IV to avoid repetitions

44
New cards

what is CTR

Does not use chaining and can be used with parallel processin, uses a nonce and its inattentive

45
New cards

what is GCM

a fast and efficient cipher block that uses parallel processing. Can be authenticated and provides confidentiality

46
New cards

What is CCM

So authentication is established using the CBC MAC tag

and then confidentiality using the Counter modes symmetric algorithm

47
New cards

what is Asymmetric Cryptogragy

A type of cryptography where two keys are used: a public key for encryption and a private key for decryption, enabling secure communication.

48
New cards

what are advantages of asymmetric cryptography

more simplified key management and the public key is freely distributed enabling secure communication and exchange. It also allows for non-repudiation, as the private key can verify the identity of the sender.

49
New cards

what are the disadvantages of asymmetric cryptography

It is generally slower than symmetric cryptography, requires more computational power, and may involve a more complex key management system.

50
New cards

what is the diffie-hellman asymetric cryptography algorithm

It is a method for sharing keys over a unsecured communication channel. No keys are created by the algorithm just a way to securely exchange cryptographic keys.

51
New cards

what are diffie-hellman groups?

DH groups set the size of the secret number during the DH process.

52
New cards

what is the RSA asymmetric cryptography algorithm

Rivest, Shamir, Adleman

a public-key encryption system that uses large prime numbers that are computationally difficult to factor as the basis of its structure. It is the defacto standard. It provides digital signature, key exchange, and encryption services

53
New cards

what is ECC asymmetric cryptography algorithm

Elliptical Curve Cryptography

is an encryption technique based on the using points on a curve to define the public/private key pair. It offers high levels of security with relatively small key sizes and less computing power..

54
New cards

what are digital sigantures

A persons signature. It indicates knowledge and approval of an act carried out by that person.

55
New cards

What is a digital signature comprised of?

  1. Data

  2. Hashing

  3. Asymmetric Private key

56
New cards

How does hashing support integrity?

A hash is generated with the original file and sent along with the file. The recipient then hashes the file again and if it doesnt match the hash sent over. The integrity of the message is compromised.

57
New cards

How does Asymetric Private key support autehntication and nonrepudiation?

Authentication - Only ONE person has their specific private key and so anyone with a public key can verify who it was who created it by seeing their private key since its unique.

Nonrepudiation- Again only ONE person has their unique key making it impossible for them to claim they didnt do something if they used that key.

58
New cards

What is a blockchain?

A linked list of blocks of data of an individuals financial transactions (most commonly digital). It is public and cannot be changed.

59
New cards

What are the components of a Blockchain

  1. Block header

    1. A nonce and timestamp

    2. A hash of previous block data creating the chain

    3. a hash of this blocks data

  2. Block data

60
New cards

what is in-band key exchange

exchanging keys over the same communication channel. Not very secure

61
New cards

what is out-band key exchange?

Exchanging keys over differing communication channels or with alternative technology. More secure

62
New cards

What is the RSA key exchange method

using the RSA servers public key for verification of the website and also for encryption and exchange of the Session key. Does not support perfect forward secrecy.

63
New cards

What is the Diffie-Hellman Ephemeral key exchange method

Uses DH to agree on the session key. This method does support perfect forward secrecy because the key is not connected to the servers asymmetric keys and is destroyed when the session is over.

64
New cards

What is the Elliptical Curve Diffie Hellman Ephemeral key exchange.

Uses DH for agreeing on a key by using points on an agreed upon curve to come up with the keys. This one supports perfect forward secrecy the best because the keys are not tied to the servers asymmetric keys AND the keys are smaller and therefore easier to compute.

65
New cards

What is PKI?

Public Key infrastructure

A system for generating and assigning, stores, and deleting a users key pair for asymmetric keys. It has one or more Certificate Authoritythat create private and publick keys.

66
New cards

What is CA

Certificate Authority

Responsible for issuing revoking and distributing certificates. A key component of PKI. Each user of a PKI system has a certificate that can be used to verify their authenticity.

67
New cards

what is trust root certificate authority?

A CA server that creates its own asymmetric keys and digitally signs its public key. It also creates keys for the intermediate CA and signs the public key. The root of the hierarchical trust model

68
New cards

What is the X.509 digital certificate

developed by the International Telecommunications Union. In the hierarchical trust model and uses centralized key management

69
New cards

what are the seven items in the X.509 certificati

DN Distinguished name of owner

Owners public key

The CAs Distinguished Name

the CAs digital signature

Periodicity

Certificat policy

Serial number

70
New cards

what is a CSR and what does it include

certificate signing request

a request from a client to a CA asking for a certificate to be issued.

clients digital signature, public key to be signed, common name, business name, email address, location info

71
New cards

what is key escrow

Storage of key information with third party (key escrow agency). Can be a part of key recovery process.

72
New cards

who is the recovery agent

someone with access to keys stored in a key repository

73
New cards

what is m of n control

A method to access the key server. It can only be accessed if m number of n administrators authorize access

74
New cards