6.2 Explain cryptography algorithms and their basic characteristics. Flashcards

1
Q

1 symmetric encryption in the world

A

AES - by default is 128-bit.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

DES

A

56-bit Key symmetric encryption

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

3DES

A

168-bit key symmetric encryption

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

worlds only streaming cipher

A

RC4

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Blowfish

A

64-bit symmetric encryption

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Twofish

A

128-bit symmetric encryption

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

OTP (One-Time-Pad)

A

considered unbreakable
use a key that is as long as a plain-text message
Keys are used only once and then discarded

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

1 Asymmetric encryption in the world

A

RSA (Rivest Shamir Adelman)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

DSA (Digital Signature Algorithm)

A

**Can be used only for signing data and it cannot be used for encryption.

Asymmetric encryption

United States Federal Government standard for digital signatures.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Diffie-Hellman

A

Used for exchanging encryption keys over an untrusted network.
Asymmetric encryption

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

El Gamal

A

Asymmetric encryption

Derived from Diffie-Hellman

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Elliptic curve cryptography (ECC)

A

Used for cell phones

Asymmetric encryption

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Pretty Good Privacy (PGP) / Gnu Privacy Guard (GPG)

A

Asymmetric/Symmetric HYBRID encryption

Widely used for email encryption

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Secure Socket Layer (SSL)

A

Primarily used for secure online transactions such as online shopping or banking.
– HTTPS
– FTPS

weaker than TLS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

How many Asymmetric encryption standards are there for the test?

A

5

  • Diffie-Hellman
  • ElGamal
  • DSA
  • RSA
  • ECC
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Transport Layer Security (TLS)

A

Like SSL, TLS is used for secure connections over the Internet
– HTTPS
– FTPS

Stronger than SSL

17
Q

1 hashing algorithm in the world

A

MD5 (Message Digest 5)

18
Q

MD5 message digest length

A

Produces a 128-bit / 32 character message digest from variable length data.

19
Q

How many bit is SHA1?

A

SHA-1: 160 bit hash from any size of data.

20
Q

test question about military phones uses Sha2. How many bits?

A

SHA-2: 256 bit hash (32 byte word)

21
Q

RIPEMD (RACE Integrity Primitives Evaluation Message Digest)

A

RIPEMD-160 performs like SHA-1 and is same size

22
Q

HMAC (Hash-based Message Authentication Code)

A

HMAC is never used alone

The Size Varies, it takes on the size of whatever you are using it with.

23
Q

BCRYPT

A

A password hashing function based on the Blowfish cipher

24
Q

Password-Based Key Derivation Function 2 (PBKDF2)

A

key stretching software

25
Q

XOR

A

obfuscation

26
Q

Substitution ciphers

A

type of coding or ciphering system that changes one character or symbol into another.
Caesar cipher

27
Q

ROT13 is this

A

Caesar cipher/Substitution ciphers

28
Q
You are responsible for e-commerce security at your company. You want to use the most widely implemented asymmetric algorithm available today. Which of the following is the most widely used asymmetric algorithm today?
A. RSA
B. AES
C. 3DES
D. SHA
A

A. RSA

29
Q
You need to encrypt your hard drive. Which of the following is the best choice?
A. DES
B. RSA
C. AES
D. SHA
A

C. AES

30
Q
Which of the following is similar to Blowfish but works on 128-bit blocks?
A. Twofish
B. IDEA
C. CCITT
D. AES
A

A. Twofish