Podcast
Questions and Answers
What does Integrity provide?
What does Integrity provide?
Assurances that data has not been altered
What does hashing ensure?
What does hashing ensure?
That data has retained integrity.
What is a hash?
What is a hash?
A number derived from performing a calculation on data.
What are MD5 and SHA?
What are MD5 and SHA?
Signup and view all the answers
What does Confidentiality ensure?
What does Confidentiality ensure?
Signup and view all the answers
What does Encryption protect?
What does Encryption protect?
Signup and view all the answers
How does Encryption work?
How does Encryption work?
Signup and view all the answers
What two things does Encryption normally need?
What two things does Encryption normally need?
Signup and view all the answers
What is Symmetric Encryption?
What is Symmetric Encryption?
Signup and view all the answers
What is Asymmetric Encryption?
What is Asymmetric Encryption?
Signup and view all the answers
Anything encrypted with the public key can only be decrypted with the matching _________ key.
Anything encrypted with the public key can only be decrypted with the matching _________ key.
Signup and view all the answers
Anything encrypted with the private key can only be decrypted with the matching _____ key.
Anything encrypted with the private key can only be decrypted with the matching _____ key.
Signup and view all the answers
______ ciphers encrypt data one bit at a time.
______ ciphers encrypt data one bit at a time.
Signup and view all the answers
______ ciphers encrypt data in blocks.
______ ciphers encrypt data in blocks.
Signup and view all the answers
What validates an identity?
What validates an identity?
Signup and view all the answers
What prevents a party from denying an action?
What prevents a party from denying an action?
Signup and view all the answers
_____ ______ provide authentication, non-repudiation, and integrity.
_____ ______ provide authentication, non-repudiation, and integrity.
Signup and view all the answers
How can you verify integrity?
How can you verify integrity?
Signup and view all the answers
What is an analogous term for hash?
What is an analogous term for hash?
Signup and view all the answers
What is Message Digest 5?
What is Message Digest 5?
Signup and view all the answers
What are the four variations of SHA?
What are the four variations of SHA?
Signup and view all the answers
Which SHA version is not used?
Which SHA version is not used?
Signup and view all the answers
Rootkits can modify what level files?
Rootkits can modify what level files?
Signup and view all the answers
What hashing method uses a fixed-length string of bits and a shared secret key?
What hashing method uses a fixed-length string of bits and a shared secret key?
Signup and view all the answers
What protocols use HMAC-MD5 and HMAC-SHA1?
What protocols use HMAC-MD5 and HMAC-SHA1?
Signup and view all the answers
What is md5sum.exe?
What is md5sum.exe?
Signup and view all the answers
Hashes will always ____ _____ ____ no matter how many times you calculate it.
Hashes will always ____ _____ ____ no matter how many times you calculate it.
Signup and view all the answers
Hashing is a _____ ____ ____ that creates a string of characters.
Hashing is a _____ ____ ____ that creates a string of characters.
Signup and view all the answers
You cannot ______ the hash to re-create the original file.
You cannot ______ the hash to re-create the original file.
Signup and view all the answers
How many bits are in MD5?
How many bits are in MD5?
Signup and view all the answers
How many bits are in SHA-1?
How many bits are in SHA-1?
Signup and view all the answers
How many bits are in SHA-2?
How many bits are in SHA-2?
Signup and view all the answers
How many bits are in HMAC-MD5?
How many bits are in HMAC-MD5?
Signup and view all the answers
How many bits are in HMAC-SHA1?
How many bits are in HMAC-SHA1?
Signup and view all the answers
Are MD5, SHA-1, SHA-2, SHA-3, SHA-0 used for encrypting data?
Are MD5, SHA-1, SHA-2, SHA-3, SHA-0 used for encrypting data?
Signup and view all the answers
What is an old Windows-based hashing algorithm that is backwards compatible?
What is an old Windows-based hashing algorithm that is backwards compatible?
Signup and view all the answers
What does RACE Integrity Primitives Evaluation Message Digest stand for?
What does RACE Integrity Primitives Evaluation Message Digest stand for?
Signup and view all the answers
How many keys does AES use?
How many keys does AES use?
Signup and view all the answers
What does RADIUS use for symmetric encryption?
What does RADIUS use for symmetric encryption?
Signup and view all the answers
What type of encryption does RADIUS use?
What type of encryption does RADIUS use?
Signup and view all the answers
What is AES?
What is AES?
Signup and view all the answers
What is RC4?
What is RC4?
Signup and view all the answers
What is Blowfish?
What is Blowfish?
Signup and view all the answers
What is Twofish?
What is Twofish?
Signup and view all the answers
What are AES, DES, 3DES, Blowfish, Twofish, and RC4?
What are AES, DES, 3DES, Blowfish, Twofish, and RC4?
Signup and view all the answers
Although asymmetric encryption is very strong it is also very resource intensive.
Although asymmetric encryption is very strong it is also very resource intensive.
Signup and view all the answers
What is a certificate?
What is a certificate?
Signup and view all the answers
What is RSA?
What is RSA?
Signup and view all the answers
What are the two primary categories of asymmetric keys?
What are the two primary categories of asymmetric keys?
Signup and view all the answers
Does RSA use static or ephemeral keys?
Does RSA use static or ephemeral keys?
Signup and view all the answers
What does Perfect forward secrecy indicate?
What does Perfect forward secrecy indicate?
Signup and view all the answers
What encryption method is commonly used with small wireless devices?
What encryption method is commonly used with small wireless devices?
Signup and view all the answers
What is Diffie-Hellman?
What is Diffie-Hellman?
Signup and view all the answers
What are the two Diffie-Hellman methods that use ephemeral keys?
What are the two Diffie-Hellman methods that use ephemeral keys?
Signup and view all the answers
What is Quantum Cryptography?
What is Quantum Cryptography?
Signup and view all the answers
During Quantum Cryptography, when a third party reads any of the photons in the stream, what happens?
During Quantum Cryptography, when a third party reads any of the photons in the stream, what happens?
Signup and view all the answers
Web site encryption commonly uses a combination of what?
Web site encryption commonly uses a combination of what?
Signup and view all the answers
Study Notes
Integrity and Hashing
- Integrity ensures that data has not been altered during transmission or storage.
- Hashing is a method used to confirm data integrity by generating a unique number from input data, maintaining the integrity if the data remains unchanged.
- MD5 and SHA are widely recognized hashing algorithms utilized for various data integrity checks.
- A hash produces a condensed representation of data, making it useful for verification processes.
Confidentiality and Encryption
- Confidentiality guarantees that sensitive data is accessible only to authorized users.
- Encryption safeguards the confidentiality of data by transforming it into an unreadable format for unauthorized access.
- Encryption requires an algorithm and a key; two key types include symmetric (same for encryption and decryption) and asymmetric (public and private keys).
Digital Signatures and Authentication
- Authentication involves validating identity, ensuring a user is who they claim to be.
- Non-repudiation prevents a party from denying their actions, particularly in communications.
- Digital signatures provide authentication, non-repudiation, and integrity.
Hashing Characteristics
- Hash functions are one-way functions that generate a fixed-length output, making it impossible to reverse-engineer the original data.
- Hash values remain consistent for the same input, regardless of how many times generated.
Encryption Context
- MD5 generates a 128-bit hash, SHA-1 produces a 160-bit hash, and SHA-2 supports various bit sizes (224, 256, 384, 512).
- HMAC (Hashed Message Authentication Code) uses a shared secret key combined with a hash function for added security.
- RADIUS employs symmetric encryption using shared keys, specifically for managing network access.
Symmetric and Asymmetric Ciphers
- AES is a strong symmetric block cipher encrypting data in 128-bit blocks with key options of 128, 192, or 256 bits.
- RC4 is a symmetric stream cipher, while Blowfish and Twofish are block ciphers with varying bit sizes (64-bit and 128-bit, respectively).
- Asymmetric encryption, such as RSA, involves static keys and is computationally intensive.
Quantum and Diffie-Hellman Cryptography
- Quantum Cryptography relies on principles of quantum physics, where interference indicates eavesdropping.
- The Diffie-Hellman method is a secure way of exchanging symmetric keys over public networks, using static and ephemeral keys.
General Security Concepts
- Perfect forward secrecy ensures unique keys for each session, preventing key reuse.
- Certificates are digital documents containing public keys and owner information, essential for establishing secure connections.
Studying That Suits You
Use AI to generate personalized quizzes and flashcards to suit your learning preferences.
Description
This quiz focuses on Chapter 6 of the Comptia GCGA course, specifically highlighting key concepts in cryptography. It includes terms related to data integrity, hashing, and common algorithms like MD5 and SHA. Test your understanding of these important security concepts through flashcards.