290 likes | 299 Views
This presentation on cybersecurity interview questions part 5 focuses on questions from cryptography. This video will walk you through several questions related to encryption, decryption, public key infrastructure, and many more. So, let's get started!<br><br>Start learning today's most in-demand skills for FREE. Visit us at https://www.simplilearn.com/skillup-f... <br>Choose over 300 in-demand skills and get access to 1000 hours of video content for FREE in various technologies like Data Science, Cybersecurity, Project Management & Leadership, Digital Marketing, and much more. <br><br>Post Graduate Program in Cyber Security:<br>This Post Graduate Program in Cyber Security is designed to equip you with the skills required to become an expert in the rapidly growing field of Cyber Security. This cyber security course aims to help you stay abreast all the latest trends in cyber security as well. This Post Graduate Program in Cyber Security will help you learn comprehensive approaches to protecting your infrastructure and securing your data, including risk analysis and mitigation, cloud-based security, and compliance. You will receive foundational to advanced security skills through industry-leading certification courses that are part of the program.<br><br>Key Features:<br>u2705 Simplilearn Post Graduate Certificate<br>u2705 Masterclasses from MIT Faculty<br>u2705 Featuring Modules from MIT SCC and EC-Council<br>u2705 150 hours of Applied Learning<br>u2705 Get noticed by the top hiring companies<br>u2705 EC-Council learning kit<br>u2705 Industry case studies in cyber security<br>u2705 MIT SCC Professional Learning Community<br>u2705 Capstone project in 3 domains<br>u2705 25 hands-on projects<br><br>Learn more at: http://bit.ly/37Cf1SK<br><br>Start learning today's most in-demand skills for FREE. Visit us at https://www.simplilearn.com/skillup-f... Choose over 300 in-demand skills and get access to 1000 hours of video content for FREE in various technologies like Data Science, Cybersecurity, Project Management & Leadership, Digital Marketing, and much more.
E N D
41 Define cryptography, encryption and decryption. Cryptography is used by ethical hackers to secure information. It involves converting data from a readable format to a non-readable format and vice versa
41 Define cryptography, encryption and decryption. Cryptography is used by ethical hackers to secure information. It involves converting data from a readable format to a non-readable format and vice versa Consider this example: COMPUTER EQORXVGT
41 Define cryptography, encryption and decryption. Cryptography is used by ethical hackers to secure information. It involves converting data from a readable format to a non-readable format and vice versa Consider this example: COMPUTER EQORXVGT Encryption – It is the process of converting a message from a readable state to a scrambled state which makes no sense. Here, Key = Alphabet + 2
41 Define cryptography, encryption and decryption. Cryptography is used by ethical hackers to secure information. It involves converting data from a readable format to a non-readable format and vice versa Consider this example: COMPUTER EQORXVGT Decryption – message is decrypted using a secret key which is known only to the recipient. Decryption = Alphabet - 2
42 What is the difference between ciphertext and cleartext? Ciphertext refers to the text which is encrypted and totally undecipherable. The message received after decryption is known as cleartext. This text is comprehensible. COMPUTER EQORXVGT Ciphertext
42 What is the difference between ciphertext and cleartext? Ciphertext refers to the text which is encrypted and totally undecipherable. The message received after decryption is known as cleartext. This text is comprehensible. COMPUTER EQORXVGT Cleartext
43 What is a block cipher? This refers to the method of encrypting the plain message block by block. The plain message is broken down into fixed size blocks and then encrypted. Encryption Encryption = Plaintext + key Plaintext block Ex: 64 bits Ciphertext block Ex: 64 bits Key K
43 What is Public Key Infrastructure? Public Key Infrastructure (PKI) is a set of policies which secures the communication between a server and a client. It uses two cryptographic keys, public and private.
44 What is Public Key Infrastructure? Public Key Infrastructure (PKI) is a set of policies which secures the communication between a server and a client. It uses two cryptographic keys, public and private. Certification Authority Verification Authority Registration Authority Recipient Sender
44 What is Public Key Infrastructure? Public Key Infrastructure (PKI) is a set of policies which secures the communication between a server and a client. It uses two cryptographic keys, public and private. Certification Authority Verification Authority Request Registration Authority Recipient Sender
44 What is Public Key Infrastructure? Public Key Infrastructure (PKI) is a set of policies which secures the communication between a server and a client. It uses two cryptographic keys, public and private. Certification Authority Verification Authority Request is ok Request Registration Authority Recipient Sender
44 What is Public Key Infrastructure? Public Key Infrastructure (PKI) is a set of policies which secures the communication between a server and a client. It uses two cryptographic keys, public and private. Certification Authority Verification Authority Request is ok Request Certificate Private Key Registration Authority Recipient Sender
44 What is Public Key Infrastructure? Public Key Infrastructure (PKI) is a set of policies which secures the communication between a server and a client. It uses two cryptographic keys, public and private. Certification Authority Verification Authority Request is ok Request Certificate Private Key Registration Authority Signed data Recipient Sender
44 What is Public Key Infrastructure? Public Key Infrastructure (PKI) is a set of policies which secures the communication between a server and a client. It uses two cryptographic keys, public and private. Certification Authority Verification Authority Request is ok Signature Request Certificate Private Key Registration Authority Signed data Recipient Sender
44 What is Public Key Infrastructure? Public Key Infrastructure (PKI) is a set of policies which secures the communication between a server and a client. It uses two cryptographic keys, public and private. Certification Authority Verification Authority Certificate Public Key Request is ok Signature Request Certificate Private Key Registration Authority Signed data Recipient Sender
44 What is Public Key Infrastructure? Public Key Infrastructure (PKI) is a set of policies which secures the communication between a server and a client. It uses two cryptographic keys, public and private. Certification Authority Verification Authority Certificate Public Key Request is ok Signature is ok Signature Request Certificate Private Key Registration Authority Signed data Recipient Sender
44 What is Public Key Infrastructure? Public Key Infrastructure (PKI) is a set of policies which secures the communication between a server and a client. It uses two cryptographic keys, public and private. • PKI enables trusted digital identities for people. • PKI grants secure access to digital resources • The core of PKI is a certificate authority which ensures the trustworthiness of the digital data
45 What is RSA? RSA is one of the first public-key cryptosystems that is used for secure data transmission. RSA stands for Rivest, Shamir, and Adelman, who are the inventors of the technique. It is an asymmetric cryptography algorithm which works on both public and private keys. Here, the encryption key is public, and the decryption key is kept private Decryption (Using receiver’s private key) Encryption (Using receiver’s public key) - - - - - - $%&* A$J%@ - - - - - - - - - &$%@ - - - Plain Text (Sender) Cipher Text Plain Text (Receiver)
46 What are a few of the alternatives to RSA? The alternatives to RSA are as follows: Google Authenticator Duo Security Okta LastPass
47 What are the prime objectives of modern cryptography? • Non-repudiation • Confidentiality • Authenticity • Integrity 1 2 3 4 The prime objectives of modern cryptography are as follows: Confidentiality helps in keeping the information safe from unauthorized people
47 What are the prime objectives of modern cryptography? • Non-repudiation • Confidentiality • Authenticity • Integrity 1 2 3 4 The prime objectives of modern cryptography are as follows: Non-repudiation prevents denial in an electronic transaction
47 What are the prime objectives of modern cryptography? • Non-repudiation • Confidentiality • Authenticity • Integrity 1 2 3 4 The prime objectives of modern cryptography are as follows: Authenticity helps in identifying the source of the created information
47 What are the prime objectives of modern cryptography? • Non-repudiation • Confidentiality • Authenticity • Integrity 1 2 3 4 The prime objectives of modern cryptography are as follows: Integrity makes sure that the data received by the receiver is not modified
48 What is SAFER? Secure and Fast Encryption Routine(SAFER) is a block cipher. It has 64-bit block size and a byte-oriented algorithm SAFER’s encryption and decryption procedures are highly secure. This technology is used widely in applications like digital payment cards
49 How does the Public Key Infrastructure (PKI) work? ? The working of Public Key Infrastructure (PKI) at a macro level is as follows: Firstly, the request for the Digital Certificate is sent to the appropriate CA (Certificate Authority). Once the request is processed, the Digital Certificate is issued to the person requesting it The Digital Certificate then gets signed by confirming the identity of the person The Digital Certificate can now be used to encrypt the cleartext into ciphertext which is sent from the sending party to the other party
50 What is Blowfish algorithm? It is a 64-bit symmetric encryption algorithm. The same secret key is used to encrypt and decrypt messages. Here, the operations are based on exclusive ors and additions on 32bit words The key has a maximum length of 448 bits, it is variable in nature. It is also used to generate several subkey arrays
Join us to learn more! simplilearn.com UNITED STATES Simplilearn Solutions Pvt. Limited 201 Spear Street, Suite 1100 San Francisco, CA 94105 Phone: (415) 741-3319 INDIA Simplilearn Solutions Pvt. Limited #53/1C, 24th Main, 2nd Sector HSR Layout, Bangalore 560102 Phone: +91 8069999471 UNITED STATES Simplilearn Solutions Pvt. Limited 801 Corporate Center Drive, Suite 138 Raleigh, NC 27607 Phone: (919) 205-5565