Frage ![]() |
Antworten ![]() |
|||
---|---|---|---|---|
SHA
|
secure hash algorithm sha256 to ilosc bitow skrotu hash
|
|||
MD5
|
message-digest algorithm5 hash, ma problem z kolizjami
|
|||
AES
|
Advanced Encryption Standard symetryczny, nowszy od DES
|
|||
DES
|
Data Encryption Standard symetryczny
|
|||
3DES
|
3 Data Encryption Standard symetryczny, szyfrujemy 3 razy algorytmem DES
|
|||
RSA
|
Algorytm Rivesta-Shamira-Adlemana asymetryczny
|
|||
DSA
|
Digital Signature Algorithm asymetryczny, służy do podpisywania nie do szyfrowania
|
|||
diffie hellman
|
key exchange protocol
|
|||
MAC
|
Message Aurhentication Code
|
|||
salt pepper
|
salt - randomly generated string added to the end of password, every password has different salt, salt is stored in database so it is vuln to dict/brute force attack in pepper, server adds random (ex 30) different char combinations to the end of password and creates hashes based on it pepper is for example one char added to the end of password and it is randomly generated but it is not stored in database so it is hard to brute force
|
|||
HMAC
|
key-hash message authentication code it provides integrity(because of hash func) and authentication(because only the sender knows the secret key) it takes hash function, secret key and produces a MAC
|
|||
PKI
|
set of rules to provided authentication(digital certificates) and confidentiality(encyption), has two keys
|
|||
csr
|
certificate signing request
|
|||
crl
|
certificate revoking list - list of revoked certificates stored as a single file in the ca
|
|||
ocsp
|
online certificate status protocol, zwraca informacje o certyfikacie: good, revoked, unknown sluzy glownie do sprawdzania czy certyfikat nie zostal zrevoke-owany
|