Encryption Fundamentals Flashcards
DES
Data Encryption Standard, 56-bit key, 64-bit block cipher, insecure due to brute-force vulnerability.
3DES
Triple DES applies DES three times, more secure than DES but slower and outdated.
AES
Advanced Encryption Standard, supports 128/192/256-bit keys, widely used and secure.
RC4
Stream cipher in the RC family, deprecated due to keystream bias and insecurity.
RC5
Block cipher with variable block size, key size, and number of rounds.
RC6
Advanced block cipher based on RC5, finalist in AES competition.
RSA
Public key cryptosystem based on factoring large prime numbers, used for encryption and digital signatures.
DSA
Digital Signature Algorithm, used only for digital signatures, based on discrete logarithms.
ECC
Elliptic Curve Cryptography, efficient public-key system with smaller keys than RSA.
ECDSA
Elliptic Curve Digital Signature Algorithm, variant of DSA using ECC.
ElGamal
Asymmetric encryption scheme based on Diffie-Hellman, supports encryption and signatures.
ECB
Electronic Codebook Mode, simple but insecure as it reveals patterns.
CBC
Cipher Block Chaining Mode, uses IV and XOR to chain encryption.
CTR
Counter Mode, turns block cipher into stream cipher using counters.
GCM
Galois/Counter Mode, combines encryption and authentication.
CFB
Cipher Feedback Mode, stream cipher mode using block cipher.
OFB
Output Feedback Mode, another stream-like mode avoiding error propagation.
MAC
Message Authentication Code, ensures data integrity and authenticity with a shared secret.
HMAC
Keyed-hash MAC using hash functions like SHA-256 for strong integrity checks.
AEAD
Authenticated Encryption with Associated Data, provides confidentiality and integrity.
Diffie-Hellman
Key exchange method allowing two parties to establish a shared secret.
ECDH
Elliptic Curve Diffie-Hellman, efficient key exchange over ECC.
PFS
Perfect Forward Secrecy, ensures compromise of long-term keys doesn’t affect past sessions.
DHE
Ephemeral Diffie-Hellman, supports PFS by generating temporary keys per session.