Crypto Flashcards
(27 cards)
Cipher
Cryptographic algo
Series of well-defined steps that we use to encrypt plaintext
Cryptanalysis
Science of breaking encrypted communication
Cryptography
Creating message where content is hidden
Cryptology
Science of securing communication
Confusion
Relationship between plaintext and ciphertext
Diffusion
Order of the plaintext should be diffused (dispersed) in the cyphertext
Symetric number of key
n(n-1)/2
Asymmetric number of keys
2n
3 DES which secure mode to use ?
K1?keymode 1
3different keyswith 112bitbkey strength
Replacement of triple DES is ?
IDEA
128bit key, 64bit block size
Slower than AES and patented !
Blowfish ?
Not secure
Block cypher
64bit blocks
Replaced by twofish
Twofish ?
Block cypher 128bit blocks
Key length 128 , 192 or 256
Secure
Feistel cipher
Plaintext block into two halves (Left and Right)
Used by a lot of cypher as DES, Twofish and 3 DES…
RC(4-6)
All symetrics
Rc4 stream cypher not secured used by wep wpa ssl and tls,40-2047 bit key length
Rc5 block cypher is secured, key length 0-2040, use s feistel
Rc6?bases on rc5 128bit block ans as aes for bit key length
Diffie-Hellman
DH
Securely exchange crypto key over a public channel
Earliest practical ex of public key exchange
ECC
Elliptic Curve Cryptography
One way function
Asymmetric
Discret logarithms to elliptical curbes
Often on low power device as using shorter key length and be as secure
Patented
256bit key is just as strongas 3072 bit rsa key
Rsa
Asymmetric
1094-4096 bit key
Slow
Patented during 1977-1997
Secure
ElGamal
Asymmetric
Based on DH
Used by PGP, Gnu privacy Guard
DSA
Asymmetric
Key generation has two phases
Use different algo than rsa
MAC (Message Authentication Code)
Hash function using a key
Used for integrity and authenticity
HMAC
Shared key with hashing
The two uses of IPSec ?
1) AH: authentication header
Protect replay attack
Auth and integrity for each packet
As digital signature
2) ESP
For confidentiality
Can provide auth and integrity
Could use one of them or both
The two mode of IPSec ?
Tunnel: encrypt and auth all package (headers included), for system that doesnt natively ipsec
Transport: only the payload, system that speak IPSEC
Ipsec SA ?
Simplex one way like walkie talkie