Test Flashcards
(41 cards)
Key people behind RSA
Ron Rivest, Adi Shamir, and Leonard Adleman
RSA was publicly described the algorithm in
1977
Applications and use cases of rsa
- Digital Signatures
- Digital Certificates
- Secure Communication Protocols
- Secure Key Exchange
Blowfish designed by (name) in (year)
Bruce Schneier
1993
Blowfish have (number) of bit
64-bit
It is significantly faster than DES and provides a good encryption rate with no effective cryptanalysis technique found to date.
Blowfish Key Exchange
The Blowfish encryption algorithm is suitable for use in scenarios where a fast, secure, and freely available encryption technique is needed. Some common use cases include:
- Data Encryption
- Network Security
- Software Protection
Blowfish PROS
Fast
Resilient
Open
Blowfish CONS
Blocksize
3DES SECURITY FEATURES:
- Triple DES ( 3 DES) is a symmetric encryption algorithm based on the Data Encryption Standard ( DES).
- It uses three successive DES operations ( encrypt- decrypt- encrypt) to achieve enhanced security.
3DES KEY SECURITY ASPECTS:
- Key Length: Uses three 56 - bit keys ( 168 bits total) for encryption, making brute- force attacks computationally infeasible.
- Key Variability: Offers keying options ( e. g., all three keys are independent or two keys are the same) to adapt to different security requirements.
- Block Size: Operates on 64 - bit blocks, which provides a larger data block size compared to DES.
ADVANTAGE OF TRIPLE DES:
- Robust Security: Provides a higher level of security compared to single DES due to the triple encryption process.
- Backward Compatibility: Maintains compatibility with existing DES implementations and infrastructure.
- Widely Adopted: Still widely used in legacy systems and environments where stronger encryption standards are required.
DES stands for
Data Encryption Standard
DES algorithm uses a key of
56-bit size
DES is a block cipher with (number) rounds of (Name) structure
16
Feistel
In 2002, it was overthrown by AES, which became the new standard following a public competition.
DES (Data Encryption Standard)
The AES Encryption algorithm also
known as the
Rijndael algorithm
AES is a symmetric block ciper algorithm with a block/chunk size of
128 bits
features of AES
- SP NETWORK
- KEY EXPANSION
- BYTE DATA
- KEY LENGTH
It works on an SP network structure rather than a Feistel cipher
structure, as seen in the case of the DES algorithm.
SP NETWORK (feature of AES)
It takes a single key up during the first stage, which is later
expanded to multiple keys used in individual rounds.
KEY EXPANSION (feature of AES)
The AES encryption algorithm does operations on byte data
instead of bit data. So it treats the 128-bit block size as 16 bytes
during the encryption procedure.
BYTE DATA (feature of AES)
The number of rounds to be carried out depends on the length of the key being used to encrypt data. The 128-bit key size has ten rounds, the 192-bit 04 key size has 12 rounds, and the 256-bit key size has 14 rounds.
KEY LENGTH (feature of AES)
4 STEPS OF AES ENCRYPTION
ALGORITHM
- Sub Bytes
- Shift Rows
- Mix Columns
- Add Round Key