Security+ Flashcards
(127 cards)
Another name for Symmetric algorithm
Private Key Algorithm
Another name for Asymmetric algorithm
Public Key algorithm
Advantage of asymmetric algorithm
Overcomes multiple key issue associated with symmetric algorithms
Hybrid encryption implementation
Use asymmetric encryption to establish connection, then exchange symmetric keys for continued communication
Advantage of symmetric algorithm
Faster
Stream cipher
Encrypt data one byte (or bit) at a time
Used for securing real-time data streams
Tend to be symmetric algorithms
Tend to be hardware encrypted
Block cipher
Breaks input into fixed lengths for encryption
Padding added if data is less than fixed length
Easier to implement than stream cipher
Tend to be software encrypted
DES algorithm
Data Encryption Standard
Symmetric algorithm
deprecated
3DES
Triple DES
Symmetric algorithm
3 symmetric keys - encrypt, decrypt, encrypt
IDEA
International Data Encryption Algorithm
Symmetric algorithm
AES
Advanced Encryption Standard
Symmetric algorithm
Current symmetric standard, most commonly used
Blowfish
Symmetric algorithm
Intended to replace DES
open source
Twofish
Symmetric algorithm
open source
RC4
Rivest Cipher 4
Symmetric stream cipher
Used in SSL and WEP
RC5
Rivest Cipher 5
Symmetric block cipher
RC6
Rivest Cipher 6
Symmetric block cipher
Introduced to replace DES; superceded by AES
Public key cryptography
Asymmetric algorithm
For confidentiality: Anyone can encrypt with public key, but only private key can decrypt
For non-reputiation: sender should sign messiage with private key, reader should read with public key
Digital Signature
Hash digest for message sent with sender’s private key
Diffle-Hellman (DH) algorithm
Asymmetric algorithm
Used to distribute keys of unsecure network
Often used for create VPN tunnels; part of IPSec
Rivest, Shamir and Adleman (RSA) Algorithm
Asymmetric algorithm
Relies on difficulty of factoring prime numbers
Elliptic Curve Cryptography (ECC)
Asymmetric algorithm
Heavily used on mobile devices
More efficient than RSA
Hashing
one way cryptographic function that outputs unique message digest
always the same length per the algorithm in use
Pass the Hash attack
login with stored hash rather than plaintext password
Rainbow table
Precomputed table for reversing cryptographic hash functions