What are the advantages of ASYMMETRIC KEY encryption?
Name the modes of DES Symmetric encrption algorithm
What is a HASH FUNCTION and what is it used for?
2. Five basic requirments of a crypto hash:
1. What is MD4 and how does it work?
2. Is it still secure?
What are the HASH value lengths for HAVAL (MD5 variant) and what does it stand for?
What are the key lengths of:
MD2
MD4
MD%
Each has a key length of 128 bits.
What is the key length for SHA-1?
160 bits
What does HASHING to messages provide and how can Privacy be
implemented with hashing?
For privacy the entire message can be encrypted with the public key.
What is HMAC and what is it used for?
What are the algorithms that are part of the DSS (Digital Signature Standard)?
‘What are Schorr and Nyberg-Rueppel?
Dignature signature algorithms.
What are these terms associated with certificate authorities (CAs)?
CPV= Certificate path validation
Enrollment= you supply your public key and CA issues a digitally signed certificate
Verification= Using the CAs piblic key to verify a certificate is authenticate
CRL= Certificate revocation list or OCSP= Online Certificate Status Protocol
1. What are the specific disk encryption technologies for Windows?
2. What about Mac OS?
3. What does OS Vera Crypt support?
What should you do if your require confidentiality
with an e-mail?
You should encrypt the message.
If you need to ensure integrity of an
e-mail message what should you do?
You should digitally sign the message
What should you apply to an e-mail if you need authentication, integrity and/or non-repudiation?
You should digitally sign the message.
What should you apply to an e-mail if your message requires authentication, integrity, non-repudiation and confidentiality?
You should encrypt and digitally sign your message.
What is PGP and what are some of the commercial versions used for?
PGP is Pretty Goof Privacy and is an e-mail encryption algorithm. The commercial version provides the following:
What types of encryption does the Freeware version of PGP use for encryption and for key management?
What does S/MIME stand for and what encryption
algorithm does S/MIME use?
What is Link Encryption?
It is encryption that encrypts traffic entering the tunnel on one end and decrypts it on the other end. This ensures communications are secure between to distinct points.
What is end to end encryption?
Protect communicatiosn between two parties (e.g. user and server). This portects from monitoring on an encrypted side or traffic sent over an unencrypted link.