18 Questions
What is the purpose of using a salt in PBKDF2?
To ensure the key is unique for each user
What is the recommended minimum number of iterations for PBKDF2?
1000
How are private keys stored using PKCS #8?
The private key is encrypted using PBES2 with PBKDF2 for key derivation
Which S2K algorithm is recommended for PGP?
Type 3 S2K (iterated and salted)
What is the main claim made by the security company about password-based cryptography?
Password-based keys can be compromised, but the level of security depends on the implementation
What is the primary purpose of using PBKDF2 in password-based cryptography?
To increase the cost of dictionary attacks
Which type of devices are commonly used to store MKs in high-security environments?
Hardware security modules (HSMs)
What is the self-destruct mechanism of Hardware Security Modules (HSMs) triggered by?
Tampering detection
Which technique involves using a key-generating key (KGK) with unique data to derive secret keys stored in secure embedded devices?
Key diversification
Which standard defines key-wrap algorithms for use with an AES KEK to encrypt and store a secret key?
RFC 3394/5649
In the context of secure transactions, what is the purpose of passing KEKs and DKs as parameters to each transaction when needed?
To mitigate key theft risks
What is the main purpose of issuing and storing keys in secure embedded devices like smart cards or tokens?
To ensure tamper-resistant key storage
In a key hierarchy, what is the primary purpose of Master Keys (MKs)?
To distribute and protect Key-Encrypting Keys (KEKs) and Data Keys (DKs)
Which of the following statements about Key-Encrypting Keys (KEKs) is correct?
KEKs are optional and used to distribute and protect Data Keys (DKs)
What is the primary purpose of Data Keys (DKs) in a key hierarchy?
To encrypt and decrypt sensitive data, as well as generate Message Authentication Codes (MACs)
Which of the following statements best describes the rationale behind using a key hierarchy?
To limit the exposure of encryption keys and minimize the amount of protected information
In a key hierarchy, which of the following keys are distributed manually for security reasons?
Master Keys (MKs)
Which of the following statements about key hierarchy is incorrect?
Master Keys (MKs) are used to encrypt and decrypt sensitive data directly
Learn about how key hierarchy is commonly implemented, the difference between master keys, key-encrypting keys, and data keys, and how to implement secure key storage using hardware devices. Also explore insecure key storage methods using password-based key derivation.
Make Your Own Quizzes and Flashcards
Convert your notes into interactive study material.
Get started for free