CRYPTOGRAPHY & PKI (EXAMPLES) Flashcards

(11 cards)

1
Q

is a symmetric encryption algorithm used to secure data by encrypting and decrypting information with the same secret key.
This is the industry standard for data encryption and is approved by the U.S. government.

A

Advanced Encryption Standard

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

is a symmetric encryption algorithm used to secure data by encrypting and decrypting information with the same secret key.
This is the industry standard for data encryption and is approved by the U.S. government.

A

Advanced Encryption Standard

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

is an asymmetric encryption algorithm that uses two keys: a public key and a private key.
Unlike AES, blank does not use the same key to encrypt and decrypt.

A

Rivest–Shamir–Adleman

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

is a family of cryptographic hashing algorithms used to verify data integrity.
This does not encrypt data.
It creates a fixed-length hash value (also called a digest) from any input.

A

Secure Harsh Algorithm

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

is a framework of hardware, software, policies, and procedures used to create, manage, distribute, store, and revoke digital certificates.
Blank is what makes secure communication and trust on the internet possible.
Blank is built around digital certificates and asymmetric cryptography.

A

Public Key Infrastructure

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

is a trusted organization or server that issues and digitally signs certificates to verify identities.
A blank acts as a trusted third party in PKI.

A

Certificate Authority

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

is a cryptographic protocol used to secure data in transit over a network, especially on the internet.
Blank provides three main security services:
Encryption — keeps data private
Integrity — prevents data from being altered
Authentication — verifies identity

A

Transport Layer Security

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

is a cryptographic protocol that was originally used to secure data in transit between systems, especially web browsers and servers.

A

Secure Sockets Layer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

is a method that uses a cryptographic hash function plus a secret key to verify data integrity and authenticity.
Blank answers two questions:
Was the data changed? (Integrity)
Did it come from a trusted sender? (Authentication)

A

Hash-based Message Authentication Code

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

is a security feature that ensures past encrypted communications remain secure even if long-term keys are compromised in the future.

A

Perfect Forward Secrecy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

is a dedicated hardware chip on a system’s motherboard that securely stores cryptographic keys and performs security-related functions.
The blank provides a hardware root of trust.

A

Trusted Platform Module

How well did you know this?
1
Not at all
2
3
4
5
Perfectly