2.8 crytp Flashcards

1
Q

Only encryption standard with a stream cipher

A

RC4

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What encryption is used on mobile devices, and why?

A

ECC

It saves CPU/power for TLS/SSL asymmetric key

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Is DES symmetric or asymmetric?

A

symmetric

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Is Twofish symmetric or asymmetric?

A

symmetric

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Is Blowfish symmetric or asymmetric?

A

symmetric

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Is RSA symmetric or asymmetric?

A

asymmetric

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Is PGP symmetric or asymmetric?

What is it used for?

A

PGP is a public-key cryptosystem and relies on an asymmetric algorithm (IDEA).

PGP is used for signing, encrypting, and decrypting texts, emails, files, directories, and whole disk partitions and to increase the security of email communications.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Is Diffie-Hellman symmetric or asymmetric?

A

asymmetric

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Is ECC symmetric or asymmetric?

A

asymmetric

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Is Diffie-Hellman symmetric or asymmetric?

A

asymmetric

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Is ECC symmetric or asymmetric?

A

asymmetric

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

public-key cryptosystems all rely on what? Examples?

A

an asymmetric algorithm

Diffie-Hellman, RSA

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Name two 128bit hashing algorithms

A

MD5

NTLM

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Name two 160bit hashing algorithms

What is one used for?

A

RIPEMD

SHA-1 (SRTP encryption)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Name one 256bit hashing algorithm

A

SHA-2

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Is AES symmetric or asymmetric?

What is it used for?

A

symmetric

WPA2/WPA3

17
Q

Is DSA symmetric or asymmetric?

What is it used for?

A

asymmetric

Federal information processing standard for digital signatures.