Needs Improvement Flashcards
(105 cards)
DES
Symmetric
Key Length: 64 bit
3 DES or
TDES
(Triple DES)
Symmetric
Key Length 56 bit*3
AES
Symmetric
Key Length: 128,192,256 bit
IDEA
Symmetric
128 bit
Skipjack
Symmetric
80 bit
Blowfish
Symmetric
32-448 bit
TwoFish
Symmetric
2048
RC4
Symmetric
40-2048
RC5
Symmetric
2048
CAST
Symmetric
40-128 bit & 128-256 bit
Diffie Hellman
Asymmetric
No confidentiality, authentication, or
non-repudiation
* Secure key transfer
RSA
Asymmetric
4096 bit
Uses 1024 keys
* Public key and one-way function for
encryption and digital signature
verification
* Private key and one-way function for
decryption and digital signature
generation
* Used for encr
Elgamal
Asymmetric
Any Size
Elliptic Curve Cryptosystem (ECC)
Asymmetric
Any Size
Symmetric Algorithms
Use a private key which is a secret key between two parties.
Each party needs a unique and separate private key.
Number of keys = x(x-1)/2 where x is the number of users. Eg.
DES, AES, IDEA, Skipjack, Blowfish, Twofish, RC4/5/6, and
CAST.
Stream Based Symmetric Cipher
Encryption done bitwise and use keystream generators Eg.
RC4.
Block Symmetric Cipher
Encryption done by dividing the message into fixed-length
blocks Eg. IDEA, Blowfish and, RC5/6
Asymmetric Algorithms
Use public and private key where both parties know the public
and the private key known by the owner .Public key encrypts
the message, and private key decrypts the message. 2x is total
number of keys where x is number of users. Eg. Diffie-Hellman,
RSA, El Gamal, ECC, Knapsack, DSA, and Zero Knowledge
Proof.
Physical (1)
Electrical signal : Bits to voltage
Data Link Layer (2)
PPP - PPTP - L2TP - - ARP -
RARP - SNAP - CHAP - LCP -
MLP - Frame Relay - HDLC -
ISL - MAC - Ethernet - Token
Ring - FDDI
Network
layer (3)
CMP - BGP - OSPF - RIP - IP -
BOOTP - DHCP - ICMP
Transport (4)
TCP - UDP datagrams. Reliable end to end data
transfer -Segmentation - sequencing - and error checking
Session (5)
TCP - UDP - NSF - SQL - RADIUS - and RPC - PPTP - PPP
Presentation (6)
TCP - UDP messages