Security+ Cryptography

Description

CompTIA Information Technology (Security+ ) Flashcards on Security+ Cryptography, created by Lyndsay Badding on 28/04/2023.
Lyndsay Badding
Flashcards by Lyndsay Badding, updated almost 1 year ago
Lyndsay Badding
Created by Lyndsay Badding about 1 year ago
0
0

Resource summary

Question Answer
Stream Ciphers RC4, CFB, OFB symmetric key algorithms encrypt plaintext to ciphertext, either one bit or byte at a time easier to reverse, but fast than block ciphers
Block Ciphers AES, DES, 3DES, ECB, GCM, MD5, Blowfish, Twofish symmetric key algorithms encrypt plaintext to ciphertext, most commonly in 64-bit blocks harder to reverse, but slower than stream ciphers
Symmetric Encryption AES, DES, 3DES, Blowfish, Twofish, RC4
Asymmetric Encryption part of PKI RSA. DH, DSA, ElGamal, ECC
Ephemeral Keys asymmetric encryption keys that are generated for each key exchange, may be used more than once in a session exist for a short period of time
Elliptical Curve = ECC leverages the algebraic structures of elliptic curves over finite fields to derive public/private key pairs
Cipher Suites generated to identify specific types of encryption on info based on 4 elements: 1. the key exchange algorithm RSA, DH, ECDH, ECDHE 2. the authentication algorithm RSA, DSA, ECDSA 3. the bulk encryption algorithm AES, 3DES 4. the MAC algorithm SHA, MD5
Hashes SHA-1, SHA-2, MD5, RIPEMD
CRC used for message integrity verification
Key Stretching a way to strengthen weak passwords uses salting and hashing repeatedly BCRYPT, PBKDF2
Checksums essentially hashes, typically used to check the integrity of files or packets
Homomorphic Encryption allows data to be analyzed without making the data visible
PKI built around a server that creates, issues, and stores digital certificates
Key Escrow is a service provided by a company to secure a backup of the keys by the client company to its employees, systems, and websites
Certificate Formats and Purpose DER (.cer) - binary encoded, does not include private keys PEM (.pem, .cer, .crt) - Base 64 ASCII encoded PKCS#7 (.p7b) - includes public key, cert info, cert chain PKCS#12 - includes both keys, cert info + extended properties, cert chain
Show full summary Hide full summary

Similar

CCNA Security 210-260 IINS - Exam 3
Mike M
Application of technology in learning
Jeff Wall
Innovative Uses of Technology
John Marttila
Ch1 - The nature of IT Projects
mauricio5509
The Internet
Gee_0599
SQL Quiz
R M
CCNA Answers – CCNA Exam
Abdul Demir
Professional, Legal, and Ethical Issues in Information Security
mfundo.falteni
System Analysis
R A
Flash Cards Networks
JJ Pro Wrestler
EDUC260- Multimodal Literacies for a Digital Age
angelwoo2002