C178 Cryptography 3

its4forscience's version from 2018-01-14 20:16


Question Answer
What does CIA stand for?Confidentiality, Integrity, and Availability
relates to disaster recovery and system redundancyAvailability
intended to prevent the unauthorized disclosure of informationConfidentiality
effectiveness of a cryptographic system in preventing unauthorized decryptionStrength
also referred to as the algorithm's work factorStrength (an estimate of the amount of time and effort to break the system)
work w/ SSL/TLS to combine authentication, encryption, and msg authenticationCipher suites
providing assurance that a message wasn't modified during transmissionIntegrity
should have mechanism to indicate that msg has been corrupted or alteredIntegrity
can be accomplished by adding info such as redundant data for decryptionIntegrity
A common method of verifying integrity involves adding a...message authentication code (MAC) to the message
derived from the message and a shared secret keyMAC (message authentication code)
validates the integrity of the message and the senderdigital signature
A signature area within a messageMessage Digest
process of verifying that the sender is who they say they areAuthentication
prevents one party from denying actions they carried outNon-repudiation
Third-party organizations that manage public keys and issue certificatescertificate authorities (CAs)
Addresses the possibility that a third party may need to access keysKey escrow
an entity that has the ability to recover a key components, older keyskey recovery agent
the process of providing certificates to users, typically handled by a RA (registration authority)Key registration
literally a list of certificates that a specific CA states should no longer be usedcertificate revocation list (CRL)
CRLs are now being replaced by a real-time protocol called...Online Certificate Status Protocol (OCSP)
four main types of trust models that are used with PKI are...bridge, hierarchical, hybrid, and mesh