Crypto Flashcards

1
Q

MD5

A

128 Bit - Hash - Integrity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

SHA-1

A

160 Bit - Hash - Integrity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

SHA-2

A

224, 256, 384, 512 Bit Hash - Integrity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

HMAC-MD5

A

128 Bit - Hash with Shared Secret Key. Integrity and Authenticity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

HMAC-SHA1

A

160 Bit - Hash with Shared Secret Key. Integrity and Authenticity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

RIPEMD

A

160, 128, 256, 320 Bit Hashes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

LANMAN

A

Hash

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

NTLM, NTLMv2

A

Hash

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

How does Symmetric Encryption use keys?

A

Encrypts and Decrypts with the same key

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

How does Asymmetric Encryption use keys?

A

Matched key pair of a public key and private key

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Symmetric Encryption Algorithms (6)

A

AES, DES, 3DES, Blowfish, Twofish, RC4

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

AES Cipher

A

128 Bit Block

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

DES Cipher

A

64 Bit Block

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

3DES Cipher

A

64 Bit Block

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Blowfish Cipher

A

64 Bit Block

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Twofish Cipher

A

128 Bit Block

17
Q

RC4 Cipher

18
Q

AES Key Size

A

128, 192, 256 bit key

19
Q

DES Key Size

A

56 Bit Key

20
Q

3DES Key Size

A

56, 112, 168 Bit key

21
Q

Blowfish Key Size

A

32 to 448 Bit Key

22
Q

Twofish Key Size

A

128, 192, 256 Bit Key

23
Q

RC4 Key Size

A

40 - 2,048 Bit Key

24
Q

Diffie-Hellman

A

Key Exchange Algorithm to privately share a symmetric Key

25
IPsec
Can Encrypt in Tunnel Mode or Transport Mode (between two systems)
26
IPsec uses Authentication Header (AH) for what?
Authenticity & Integrity. Uses HMAC for AH
27
CSR
Certificate Signing Request
28
CRL
Certificate Revocation Library
29
OCSP
Used for Cert Validation. Queries CA. Response is "good", "revoked", "unknown"
30
PBKDF2
Key Stretching and Salting Prevents Brute Force and Rainbow Table
31
IDEA Cipher
64 Bit Block
32
IDEA Key
128 Bit Key
33
RC5 Cipher
32, 64, 128
34
RC5 Key
0-2040
35
CAST Cipher
64 Bit Block
36
CAST Key
40-128
37
SHA3
224, 256, 384, 512`