Lesson 3 Flashcards
(14 cards)
symmetric cryptography
A cryptography system that uses a single shared encryption key to encrypt and decrypt data. Best suited for bulk encryption
Symmetric Cryptography formula
N(N-1)/2 = number of keys needed
Two types of symmetric algorithms
Stream Cipher / Stream Algorithm
Block Cipher / Block Algorithm
XOR Stream Cipher
An exclusive disjunction, which means that it produces an output of truth
(or 1) whenever the two inputs differ (such as one is a zero [false] and the other is a one [true]).
C32 BRAIDS
C ast 128 / 256 (64 bit/128 bit)
3 DES 2-112 bit / 3-168 bit (48 Rds)
2 fish 128 bit
B lowfish 64 bit
R C 4 (Stream and WEP) 5,6 (Block)
A ES 128 bit Block (128/10)(192/12)(256/14)
I DEA 64 bit Block / 128 key
D ES 64 bit Block / 56 bit key (8 bit parity)
S afer+, Safer++
Symmetric Algorithms
3DES
A standard that uses three iterations of DES with two or three different
keys to increase the effective key strength to 112 bits
Advanced Encryption Standard (AES)
The encryption standard selected in October
2000 by the National Institute of Standards and Technology (NIST) that is based on the
Rijndael cipher.
Escrowed Encryption
Trusted 3rd party keeps copy of private key pair
Provide a balance between privacy and the needs of law enforcement
Clipper Chip
Used 80 bit symmetric encryption with the Skipjack algorithm (classified up
asymmetric key
A form of cryptography that does not use symmetric keys. It either uses complex formulas to solve problems (such as Diffie-Hellman to generate/exchange symmetric
keys) or uses key pair sets to provide digital signatures and digital envelopes.
DEER
D iffie-Hellman
E CC
E lGamal
R SA
Asymmetric Algorithms
Hashed Message Authentication Code (HMAC)
An algorithm that implements a partial
digital signature—it guarantees the integrity of a message during transmission, but it does
not provide for nonrepudiation
A forward-looking
concept that has no publicly known current real-world applications or uses. The idea is to take advantage of the dual nature of light at the quantum level, where it acts both as a wave and as a particle
quantum cryptography
A hierarchy of trust relationships that makes it possible to
facilitate communication between parties previously unknown to each other
public-key infrastructure (PKI)