Encryption for Security Flashcards
(8 cards)
What is Secret-Key Encryption?
Uses one shared key for both encryption & decryption.
Main challenge = secure key exchange. Common ciphers: DES, RC4, AES, Blowfish, Twofish, IDEA.
What is the difference between Block and Stream Ciphers?
Block: Encrypts chunks (e.g. 128-bit blocks).
Stream: Encrypts bit-by-bit in real-time.
Use stream for speed & low latency (e.g., voice, video).
What are common types of Hash Attacks?
Rainbow Table: Precomputed hashes used to reverse plaintext.
Brute-Force: Try all possible combinations.
Dictionary: Try common words.
MITM: Intercept communication.
What is Salting in encryption?
Salt: Random data added to make hashes unique.
Entropy: Unpredictability = stronger encryption.
Salting + strong entropy = better hash protection.
What is the problem with Key Exchange?
Problem: How to safely share secret keys.
Perfect Forward Secrecy (PFS): Past keys stay secure if long-term key is leaked.
Methods: DHE / ECDHE (temporary, per-session keys), Public key exchange.
What are the Key Exchange Quiz Tips?
PFS = Protects past session keys.
To share a key: Sender encrypts session key with receiver’s public key.
What is Tunneling in data protection?
Used to protect data in untrusted networks.
Techniques: VPN, SSL/TLS, IKE (Internet Key Exchange), Tor (onion routing).
What are the quick facts about SSL/TLS?
Tunnel built with symmetric keys.
Server sends: Digital certificate, Cipher suites.
Uses asymmetric encryption to exchange session key.
After handshake, communication is symmetric.