Cryptography Flashcards
(25 cards)
SSID
Service Set IDentifier
IV
Initialization Vector
AES
Advanced Encryption Standard. Symmetric, along with Twofish, Blowfish, DES. Subset of Rijndael block cypher
DHE
Diffie-Hellman Ephemeral. For secure key exchange
DSA
Digital Signature Algorithm
ECDHE
Elliptic-curve Diffie-Hellman Ephemeral
GPG
GNU Privacy Guard
PGP
Pretty Good Privacy
RSA
Rivest-Shamir-Adleman public-key cryptosystem
SHA
Secure Hash Algorithms (SHA-0 SHA-1 SHA-2 SHA-3)
HMAC
Hash-based Message Authentication Code
XOR
Exclusive Or logical operation. 1 true, 1 false = outputs True
CBC
Cipher Block Chaining. No parallel encryption possible as each block depends on all previous blocks. Requires an IV
GCM
Galois/Counter Mode. Symmetric-key block cypher
ECB
Electronic Code Book. Rudimentary encryption with no diffusion. Identical plaintext blocks convert to identical ciphertext blocks
CTR
Counter mode (CM) aka Integer Counter Mode (ICM), turns a block cipher into a stream cipher using a counter with successive vaules
WEP
Wired Equivalent Privacy. Wireless security algorithm
SSL
Secure Sockets Layer. Deprecated in ‘11 in favor of TLS
DES
Data Encryption Standard. Symmetric. Easy to brute force attack. Replaced by AES
MAC
Message Authentication Code
GMAC
Galois Message Authentication Code (authentication only)
TLS
Transport Layer Security. Communications crypto protocols
PFS
Perfect Forward Secrecy
EFS
Encrypting File System. Windows filesystem-level encryption