Using Cryptographic Protocols Flashcards Preview

Security+ GCGH Chapter 10, Understanding Cryptography and PKI > Using Cryptographic Protocols > Flashcards

Flashcards in Using Cryptographic Protocols Deck (9)
Loading flashcards...
1
Q

Delete where appropriate: in email Digital Signatures, the sender encrypts with their public/private key?
The sender’s/recipient’s public/private key decrypts.

A

the sender signs with the private key

the sender’s public key decrypts

2
Q

Delete where appropriate: in Email encryption, the recipients/sender
encrypts with the sender’s/recipient’s public/private key

The sender/recipient decrypts with the recipient’s/sender’s public/private key

A

to encrypt email, the sender encrypts the mail with the recipient’s public key.
the recipient’s private key decrypts (this is the same for website encryption)

3
Q

Digital Signatures provide what 3 key security goals

A

Authentication
Non-repudiation
Integrity

4
Q

What standard allows the emails to be encrypted and digitally signed using 3rd party authenticated certificates?

A

S/MIME (Secure Multipurpose Internet Mail Extensions)

5
Q

SSL and TLS handshakes require what to be issued to complete the handshake?

A

a certificate

6
Q

When two systems connect, what do they have to identify before any encryption starts happening?

A

A cipher suite

7
Q

What are the 3 primary cryptographic solutions do cipher suites provide?

A

Encryption
Authentication
Integrity

8
Q

A Crypto Module is hardware/software/firmware that implements ______ ______. To implement encryption, the module requires a xxx xxx xxx that is a XXXX XXXXX of algorithms

A

A Crypto Module is hardware/software/firmware that implements CRYPTOGRAPHIC FUNCTIONS. To implement encryption, the module requires a CRYPTO SERVICE PROVIDER that is a SOFTWARE LIBRARY of algorithms

9
Q

if you wanted to encrypt email traffic but cost was an issue which standard would you use?

A

PGP/OpenPGP. Because there is no obligation to pay licence fees