Cryptography Flashcards

1
Q

SHA-1

A

Hash - Developed by the NSA (National Security Agency), SHA-1 produces a 160-bit value output, and was required by law for use in U.S. government applications.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

RSA

A

Asymmetric algorithm - An algorithm that achieves strong encryption through the use of two large prime numbers. Factoring these numbers creates key sizes up to 4,096 bits. RSA can be used for encryption and digital signatures and is the modern de facto standard.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

MD5

A

Hash - (Message Digest algorithm) Produces a 128-bit hash value output, expressed as a 32-digit hexadecimal.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

3DES

A

Symmetric Algorithm - A block cipher that uses a 168-bit key. 3DES (called triple DES) can use up to three keys in a multiple-encryption method.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Diffie-Hellman

A

Asymmetric algorithm - Developed for use as a key exchange protocol, Diffie- Hellman is used in Secure Sockets Layer (SSL) and IPSec encryption.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Two Fish

A

Symmetric Algorithm - A block cipher that uses a key size up to 256 bits.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

RC

A

Symmetric Algorithm - (Rivest Cipher) Encompasses several versions from RC2 through RC6. A block cipher that uses a variable key length up to 2,040 bits. RC6, the latest version, uses 128-bit blocks, whereas RC5 uses variable block sizes (32, 64, or 128).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

IDEA

A

Symmetric Algorithm - (International Data Encryption Algorithm) A block cipher that uses a 128-bit key.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Blowfish

A

Symmetric Algorithm - A fast block cipher, largely replaced by AES, using a 64-bit block size and a key from 32 to 448 bits.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Elliptic Curve Cryptosystem

A

Asymmetric algorithm - (ECC) Uses points on an elliptical curve, in conjunction with logarithmic problems, for encryption and signatures. Uses less processing power than other methods, making it a good choice for mobile devices.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

SHA-2

A

Hash - Developed by the NSA, actually holds four separate hash functions that produce outputs of 224, 256, 384, and 512 bits.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

El Gamal

A

Asymmetric algorithm - Not based on prime number factoring, this method uses the solving of discrete logarithm problems for encryption and digital signatures.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

DES

A

Symmetric Algorithm - A block cipher that uses a 56-bit key (with 8 bits reserved for parity); fixed blocked size.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

AES

A

Symmetric Algorithm - (Advanced Encryption Standard) A block cipher that uses a key length of 128, 192, or 256 bits, and effectively replaces DES.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly