Cryptographic Solutions Flashcards
Symmetric Algorithm
Encryption algorithm in which both the sender and the receiver must know the same shared secret using a privately held key.
Private Key
Single Key
Asymmetric Algorithm
Encryption algorithm where different keys are used to encrypt and decrypt the data
Most common examples are Diffie-Hellman, RSA, and Elliptic Curve Cryptography (ECC)
Public Key
2 Different Keys
Stream Cipher
Utilizes keystream generator to encrypt data bit by bit using a mathematical XOR function to create ciphertext
Block Cipher
Breaks the input into fixed-length blocks of data and performs the encryption on each block
Data Encryption Standard (DES)
Symmetric Algorithm
Encryption algorithm which breaks the input into 64-bit blocks and uses transposition and substitution to create ciphertext using effective key strength of only 56 bits.
Triple DES (3DES)
Symmetric Algorithm
The encryption algorithm uses three separate symmetric keys to encrypt, decrypt, and then encrypt the plaintext into ciphertext to increase the strength of DES.
International Data Encryption Algorithm (IDEA)
Symmetric Algorithm
Symmetric Block Cipher uses 64-bit blocks to encrypt plaintext into ciphertext.
Advanced Encryption Standard (AES)
Symmetric Algorithm
Symmetric block cipher that uses 128-bit, 192-bit, or 256-bit blocks and a matching encryption key size to encrypt plaintext into ciphertext.
Blowfish
Symmetric Algorithm
Symmetric block cipher uses 64-bit blocks and a variable-length encryption key to encrypt plaintext into cipher.
Twofish
Symmetric Algorithm
It provides the ability to use 128-bit blocks in its encryption algorithm and uses 128-bit, 192-bit, or 256-bit encryption.
RC Cipher Suite
Symmetric Algorithms
It was created by Ron Rivest, a cryptographer who’s created six algorithms under the name “RC,” which stands for The Rivest Cipher.
RC4 - Symmetric stream cipher using a variable key size from 40 bits to 2048 bits that is used in SSL and WEP.
RC5 - Symmetric block cipher that uses key sizes up to 2048 bits.
RC6 - Symmetric block cipher that was introduced as a replacement for DES but AES was the chosen instead.
Diffie-Hellman (DH)
Asymmetric Algorithm
Used to conduct key exchanges and secure key distribution over an unsecured network.
Used for key exchange inside of creating a VPN tunnel establishment as part of IPSec.
RSA (Rivest, Shamir, and Adleman)
Asymmetric algorithm that relies on the mathematical difficulty of factoring large prime numbers.
Can support key sizes between 1024 bites and 4096 bits.
Elliptic Curve Cryptography (ECC)
Asymmetric Algorithm
Heavily used in mobile devices and it’s based on the algebraic structure of elliptical curves over finite fields to define its keys.
ECC with a 256-bit key is just as secure as RSA with a 2048-bit key.
Hashing
A one-way cryptographic function that takes an input and produces a unique message digest as its output.
The hash digest is always the same length.
MD5
Creates a 128-bit hash value that is unique to the input value
SHA-1
Creates a 160-bit hash digest, which significantly reduces the number of collisions that occur
SHA-2
Family of has functions that contain longer hash digests.
SHA-3
A newer family of hash functions, and its hash digest can go between 224 and 512 bits.
RIPEMD (Race Integrity Primitive Evaluation Message Digest)
Comes in 160-bit and 320-bit versions
RIPEMD-160
Open-source hashing algorithm that was created as a competitor to the SHA family.
HAMC (Hash-Based Message Authentication Code)
Used to check the integrity of a message and provide some level of assurance that its authenticity is real
Digital Security Standard (DSS)
Relies on a 160-bit message created by the digital security algorithm
Pass-the-Hash Attack
A hacking technique that allows the attacker to authenticate to a remote server or service by using the underlying has of a user’s password instead of requiring the associated plaintext password.