6.2 Explain cryptography algorithms and their basic characteristics. Flashcards
(30 cards)
1 symmetric encryption in the world
AES - by default is 128-bit.
DES
56-bit Key symmetric encryption
3DES
168-bit key symmetric encryption
worlds only streaming cipher
RC4
Blowfish
64-bit symmetric encryption
Twofish
128-bit symmetric encryption
OTP (One-Time-Pad)
considered unbreakable
use a key that is as long as a plain-text message
Keys are used only once and then discarded
1 Asymmetric encryption in the world
RSA (Rivest Shamir Adelman)
DSA (Digital Signature Algorithm)
**Can be used only for signing data and it cannot be used for encryption.
Asymmetric encryption
United States Federal Government standard for digital signatures.
Diffie-Hellman
Used for exchanging encryption keys over an untrusted network.
Asymmetric encryption
El Gamal
Asymmetric encryption
Derived from Diffie-Hellman
Elliptic curve cryptography (ECC)
Used for cell phones
Asymmetric encryption
Pretty Good Privacy (PGP) / Gnu Privacy Guard (GPG)
Asymmetric/Symmetric HYBRID encryption
Widely used for email encryption
Secure Socket Layer (SSL)
Primarily used for secure online transactions such as online shopping or banking.
– HTTPS
– FTPS
weaker than TLS
How many Asymmetric encryption standards are there for the test?
5
- Diffie-Hellman
- ElGamal
- DSA
- RSA
- ECC
Transport Layer Security (TLS)
Like SSL, TLS is used for secure connections over the Internet
– HTTPS
– FTPS
Stronger than SSL
1 hashing algorithm in the world
MD5 (Message Digest 5)
MD5 message digest length
Produces a 128-bit / 32 character message digest from variable length data.
How many bit is SHA1?
SHA-1: 160 bit hash from any size of data.
test question about military phones uses Sha2. How many bits?
SHA-2: 256 bit hash (32 byte word)
RIPEMD (RACE Integrity Primitives Evaluation Message Digest)
RIPEMD-160 performs like SHA-1 and is same size
HMAC (Hash-based Message Authentication Code)
HMAC is never used alone
The Size Varies, it takes on the size of whatever you are using it with.
BCRYPT
A password hashing function based on the Blowfish cipher
Password-Based Key Derivation Function 2 (PBKDF2)
key stretching software