Live Virtual Machine Lab 6.2: Module 06 Cryptographic Basic Concepts

Réussis tes devoirs et examens dès maintenant avec Quizwiz!

Which of the following algorithms are examples of lightweight cryptography? [Choose all that apply]

OTR TWINE Note: Lightweight cryptography strikes an equal balance for the use of computational power and security. It helps to secure these devices against various attacks, such as single-key, key-recovery, or weak-keys. Two examples of lightweight cryptography are: TWINE - block cipher OTR - Authenticated Encryption method As of the release of this title, both are in trial phases.

In asymmetric key encryption, what is the next step when a client initiates a session with a web server that is configured with a certificate?

The web server sends a certificate to the web browser Note: How asymmetric encryption works and how asymmetric key is exchanged between two entities. 1. A client initiates a session with a web server that is configured with a certificate. For example, the client enters a URL, https://www.practicelabs.com, in the web browser. 2. The request is received by the web server, which then sends its certificate to the client. It is important to note that the certificate includes the public key of the webserver. Remember, it is a pair of public and private keys. The private key is still with the webserver and should never be shared. 3. After receiving the certificate, the client first creates a symmetric key. It then takes the public key from the certificate and encrypts the symmetric key, which is then used to encrypt the session. 4. The client shares the encrypted symmetric key, which can also be called the session key. 5. After receiving, the webserver decrypts the asymmetric key or the session key with its private key. 6. Now, both the client and the webserver have the asymmetric or the session key, and they can establish a secure connection.

What is the minimum key size in Elliptical Curve Cryptography (ECC)?

160-bits Note: The key size in ECC is: - 160 - 224 - 256 - 384 - 521

How many keys are required in asymmetric encryption?

2 Note: Asymmetric encryption uses a pair of keys called a public/private key pair.

What is the key length of the Data Encryption Standard (DES) algorithm?

56-bit Note: Let's take a look at some of the key-encryption algorithms and their key lengths. Data Encryption Standard (DES) - 56-bit Triple-DES (3DES) - 168-bit Advanced Encryption Standard (AES) - 256-bit Twofish - 128, 192, 256-bit


Ensembles d'études connexes

coterminal, dms, complement, and supplement angles

View Set

Aflac Final exam incorrect questions 3

View Set

Lecture 26 (Transcription & Translation)

View Set

DECA ENTREPRENEURSHIP Financial Analysis KPI's

View Set

Chapter 23: Electric Potential Energy

View Set

Presidential Cabinet Departments

View Set