Domain 3 - Cryptographic concepts | Crypto Attacks | PKI Infrastructure Flashcards
Symmetric Encryption - Strengths
Speed, and strength per bit of key
Symmetric Encryption - Weakness
Key must be shared securely
Symmetric Encryption - Stream Cipher
Each bit is independently encrypted
Symmetric Encryption - Block cipher
Blocks of data are encrypted
Initialization Vector
Symmetric EncryptionEncryption step. Used on Symmetric ciphers to ensure that the first block of data is random
DES Encryption type
Symmetric
DES
Data Encryption Standard
DES Encryption dates
1976 US Fed standard
DES Encryption, who designed
IBM, based on older lucifer symmetric cipher
DES Encryption, block size
64 bit
DES Encryption, key size
56 bit
DES Modes
5 modes
Double DES
The DES encryption algorithm with two rounds, with two keys. Rendered unusable due to being susceptible to meet in the middle attacks.
Triple DES
Expands the size of the key by running the algorithm in succession with three different keys. It makes 48 passes through the algorithm, and the resulting key is 168 bits.
IDEA Encryption/Cipher Type
International Data Encryption Algorithm.Symmetric Block Cipher
IDEA - good or bad?
Held up to cryptanalysis
IDEA - drawback
Patent encumbrance (no longer an issue, not sure if tested as an issue or not) and slow speed
AES Acroynym and encryption type
Advanced Encryption Standard - Symmetric
AES Block and Key Size
128 bit block
Key - 128 bit to 256 bit.
128 with 10 rounds of encryption192 bit with 12 rounds of encryption 256 bit with 14 rounds of encryption
Blowfish cipher type
symmetric
RC5 and RC6 designed by
RSA Labs
Asymmetric Encryption Pros
Solves issues around preshared keys
Asymmetric key how many
two. Public/private key pair
hashing/one-way functions
easy to compute one way. VERY difficult to reverse