review
Key distribution - correct answer ✔the function that delivers a key to two
parties who wish to exchange secure encrypted data. Some sort of
mechanism or protocol is needed to provide for the secure distribution of keys
Key distribution - correct answer ✔often involves the use of master keys,
which are infrequently
used and are long lasting, and session keys, which are generated
and distributed for temporary use between two parties.
X.509 - correct answer ✔defines the format for public-key certificates
public-key infrastructure - correct answer ✔the set of hardware, software,
people, policies, and procedures needed to create, manage, store, distribute,
and revoke digital certificates based on asymmetric cryptography.
X.509 - correct answer ✔PKI implementations make use of ___________
certificates
end-to-end
encryption - correct answer ✔a system of communication where only the
communicating users can read the messages
session key - correct answer ✔key used for the duration of a logical
connection
, master key - correct answer ✔key shared by the key distribution center and
an end system or user
Hierarchical Key Control - correct answer ✔local KDCs, each responsible for
a small domain of the overall internetwork
Session Key Lifetime - correct answer ✔The more frequently session keys
are exchanged, the more secure they are
Transparent Key Control Scheme - correct answer ✔Use of automatic key
distribution on behalf of users, but must trust system
Decentralized Key Control - correct answer ✔requires that each node be
able to communicate in a secure manner
Data-encrypting key - correct answer ✔key for general communication
across a network
PIN-encrypting key - correct answer ✔key for personal identification
numbers (PINs) used in electronic
funds transfer and point-of-sale applications
File-encrypting key - correct answer ✔key for encrypting files stored in
publicly accessible locations
Simple Secret Key Distribution - correct answer ✔Uses no keys prior to or
after communication, provides confidentiality for session key, and only useful
if attacker cannot modify/insert messages