Key Exchange & Encyption Technology Flashcards

(10 cards)

1
Q

Key Exchange

A

Key exchange → process of securely sharing encryption keys.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Out-of-Band Key Exchange

A

Out-of-band key exchange → key exchange using a separate communication channel.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

In-Band Key Exchange

A

In-band key exchange → key exchange over the same channel as data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Session Keys

A

Session keys → temporary symmetric keys used for a single encrypted session. Like a web session

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Symmetric Key

A

Symmetric key → single shared private key used for encryption and decryption at the same time. Great for bulk data like AES

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Asymmetric Key

A

Asymmetric key → public and private key pair used in a key exchange for digital signatures. Great for identity or managing symmetric keys

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

TPM

A

Trusted platform module (TPM) → hardware chip on the motherboard on a SINGLE DEVICE that stores encryption keys, passwords, biometric info, and other cryptographic operations.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

HSM

A

Hardware security module (HSM) → dedicated device that stores encryption keys, passwords, biometric info, and other cryptographic operations. Basically a big TPM for SEVERAL DEVICES. Enterprise grade security.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Key Management System

A

Key management system → centralized platform for managing cryptographic keys.

TPM and HSM are examples of a key management system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Secure Enclave

A

Secure enclave → isolated hardware environment in the CPU that stores encryption keys, passwords, biometric info, and other cryptographic operations.

Like TPM but only for secure data and apps, whereas TPM is for the whole platform

How well did you know this?
1
Not at all
2
3
4
5
Perfectly