Chapter 2 Study guide Flashcards

1
Q

DES

A
  • 56 bit key
  • 64 bit block size
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Diffie-Helmen method

A
  • First method for key exhange using a one-way function
  • Vulnerable to man-in-the-middle attacks
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

MD5

A

128 bit hash

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

RC4

A
  • Streaming cipher used in SSL and WEP
  • 40 bit key
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

RC5

A
  • Block encryption
  • variable key size
  • 32, 64, or 128 block sizes
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

3-DES

A

Uses DES 1, then DES key 2, then DES key 1 again. This equals 112 bit key size (double DES). 64 bit block size

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

SHA-1

A

160-bit hash

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

SHA-256

A

256-bit hash

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Integrity Check

A

Hashes are used to preform integrity checks.

by rehashing the output and comparing it to the original hash value to ensure nothing has been changed..

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Streaming encryption products

A

RC4 and ChaCha

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Block encryption products

A

RC5, IDEA, DES, 3-DES, AES, Blowfish and Twofish

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

AES

A
  • block encryption
  • 128, 192, or 256-bit key sizes
  • 128 block size
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

X-OR

A

compares two binary numbers and creates a new one.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

padding

A

The extra bits used to fill out the rest of an encryption.
Uses ASCII. If you have 128 bit block encryption but only 120 bits to encrypt then padding fills the 8 bits.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

PKCS#5

A

Standard used for password based encryption

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

PKCS#7

A

Standard used to sign and/or encrypt messages for PKI

17
Q

PKCS#10

18
Q

Cyber Block Chaining (CBC)

A

Salts the first block and then uses that output to encrypt the following blocks. This is used to change outputs.

19
Q

Cipher Feedback (CFB)

A

Takes a block and turns it into a stream cipher. Similar to CBC in process.

20
Q

Output Feedback (OFB)

A

Synchronous stream using X-OR

21
Q

Counter Mode (CTR)

A

Generates a counter value and a nonce

22
Q

What are the rounds for the 3 key encryption types for AES?

A

128-bit -> N=10 rounds
192-bit -> N=12 rounds
256-bit -> N=14 rounds

23
Q

Skipjack

A

Uses Clipper Chip - 80-bit key, 60 bit block

24
Q

Blowfish

A
  • 128, 192, 256 bit encryption key
  • 64 Bit Blocks
  • Memorization:
    • Blowfish is half of Twofish. A blow
      Blowfish is one fish.
    • This helps allot, especially once you learn
      the CART/CARBT method
25
Twofish
- 128, 192, 256 bit encryption key - 128 Bit Blocks
26
XTEA
- 64-bit block size - 128 bit key. - Memorization: - XT(Times Two)EA - Times Two = 64 x 2 = 128
27
Key Entropy
A degree of uncertanty
28
Memorization method: CARBT
All of these are 128, 192, 256 Bit Keys: C amilla A ES R C6 (not RC2 or RC5) B lowflish T woFish
29
Memorization method: CART
All of these are 128 Bit Blocks: C amilla A ES R C6 (not RC2 or RC5) T woFish