Value added to a hash to make sure that two similar inputs produce different hash values.
What is salt?
100
Two crucial steps in a digital signature algorithm.
What are 'key generation' and 'key verification'?
100
Important property of certificates that insures they have to be constantly updated, and limits the consequences of a certificate leaking.
What is an expiry date?
100
Value that indicates missing or unknown values in typical databases.
What is NULL?
100
The module that would be removed from the program if we go with the program restructuring suggested.
What is client side programming?
200
Property of hashing functions that make them crucially different from encryption functions, and suitable only in integrity checks.
What is non-reversibility?
200
Property of digital signatures that ensures an individual can not deny performing a particular operation the individual digitally signed.
What is non-repudiation?
200
The ogas of the internet. 'Neutral' third parties that issue digital certificates.
What is a certificate authority?
200
The kind of attack demonstrated in this comic.
What is a SQL injection?
200
The process of tracking which certificate-holding authority issued which certificate, creating a 'chain of trust'
What is the certificate path?
300
Rare, but problematic scenario where two inputs produce the same hash value. This can be exploited maliciously.
What is a collision?
300
Important property, granted by governments, that enables digital signatures to be equivalent to hand signatures.
What is legal recognition?
300
Crucial information often included in digital certificates to enable the encryption of a message to the owner of the certificate.
What is a public key?
300
Principle that dictates that table relationships must remain consistent. Therefore, a user cannot delete a record which is related to another one.
What is referential integrity?
300
The year RSA was created.
What is 1977?
400
Tool specifically designed to create random numbers fit for salting. This is also the longest acronym we have seen so far.
What is a Cryptographically Secure Pseudo-Random Number Generator (CSPRNG)
400
Family of encryption algorithms typically used to create Digital Signature algorithms
What is asymmetric encryption / private key algorithms?
400
The largest certificate authority (by market share)
What is comodo?
400
Common term for the practice of encrypting all sensitive data stored in a database.
What is encryption at rest?
400
System that enables assymetric encription to be used at large scale in digital signatures and certificates. Its main purpose is to enable the sharing and ownership of a particular public key.
What is a public key infrastructure (PKI)
500
Protocol that allows us to authenticate data between two parties using a secret key and the data itself. Help avoid man-in-the-middle attacks
What is HMAC / Key-hash mashing authentication code.
500
The three most common algorithms used for digital signatures.
What are DSA, RSA, and ECSA?
500
Strategy for designing Certificate Authorities in a more resilient manner, which allows to restart the certificate chain quickly and reliably if it is compromised.
What is an offline CA?
500
Denial of service attack strategy that involves slightly modifying a valid input to generate new versions of it, then flooding the server/database with such requests.
What is an automated input attack
500
Most common certificate format used for digital certificates.