CRYPTOGRAPHIC SOULTIONS Flashcards
(57 cards)
symmetric key
You have the same key as the main owner. Shares similiar details.
Asymmetric Key
Two different keys one for decryption and one to encrpyt.
DES-DATA ENCRYPTION STANDATD
Uses 64bit blocks. Key strength is only 56-bits.
TRIPLE DES 3DES
Three diffrent 56 bit keys.I
IDEA International data encryption algorithm
SYMMETRIC BLOCK AND USES 64 BIT BLOCKS.KEY SIZE IS 128 not used as much
AES-ADAVANCED ENCRYPTION STANDARD
SYMMETRIC BLOCK USES 128,192 OR 256 BIT BLOCKS.
Blowfish
Symmetic block cipher that uses 64bit 4048 bits also.Not widelly used
TWOFISH
Provices 128 bit 192 or 256 encryption keys open source
RC CIPHER SUITE
RIVEST CIPHER
r
RC4
40 BITS AND 2048 USED FOR SSL AND WEP
RC5
UO TO 2048 BITS
RC6
STRONGER THEN RC5
assymetric algorithms
Public and private key
USIA CIA TRAID AND NON-REPUDIATION
DIGITAL SIGNATIURE
USES YOUR PRIVATE KEY FOR INTEGRITY
DIFFIE-HELLMAN
Used to conduct key exchanges and secure key like VPN’s over a unsecure network
ASSYMETRIC
RSA
Assymmetric used for signatures key exchange and uses prime numbers 1024-4068
ELLIPTIC CURVE CRYPTOGRAPHY
USED IN MOBILE DEVICES AND BASED ON ALGEBRAIC STRUCTURES. 256 bit key
HASHING
One way cypto function and take an inpit and produces a unique message in the output
MD5
Creats 128 bit and most popular.limited in unique values.
SHA-SECURE HASH ALROGITHM
SHA-1:160 bit has digest
SHA 2: longer digest 224,256,384,512
SHA 3: 224 and 512 bits but major increase in security.
RIPEMD RACE INTEGRITY PRIMITIVE ECALUATION MESSAGE DIGEST
160,256,320 BIT. 160 BIT IS COMMANLY USED
RIPEMD-160
OPEN SOURCE
HMAC HASH BASED MESSAHE AUTH CODE
USED TO CHECK THE INTERGRITY OF A MESSAGE.
HMAC-MD5, SHA1 SHA256 ETC
GOV USES DIGITAL SCURITY STANDARD
160 BIT BUT OTHER COMPANIES USE RSA CAUSE ITS FASTER.