3 - 2: Symmetric Cryptography Flashcards

1
Q

Data Encryption Standard (DES) history

A

An IBM standard created in the 1970s to standardize government agency algorithms using the Feistel function

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Data Encryption Standard (DES) key facts

A

Symmetric algorithm, block cipher of 64-bit blocks, 56 bit key, now considered insecure

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

3DES

A

A workaround where DES is applied 3 times with 3 keys. 3 different keys is most secure.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Why 3DES and not 2?

A

Vulnerable to a meet-in-the-middle attack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Advanced Encryption Standard (AES)

A

Symmetric algorithm, block cipher of 128-bits, key lengths of 128, 192, or 256 bits, uses both substitution and transposition

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Blowfish

A

Public domain algorithm, symmetric, block cipher of 64 bits, key between 32 and 448 bits, no longer secure

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Twofish

A

Public domain encryption using Feistel network, symmetric, 128-bit blocks, keys of 128, 192, or 256 bits, still secure

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

RC4

A

A symmetric stream cipher widely used to encrypt network traffic, enabling WAP, WEP, SSL, and TLS.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

RC4 keystream

A

The stream is pseudorandom: while the stream is random, it is initialized with a selected encryption key

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

RC4 key facts

A

Symmetric, stream cipher, variable length between 40 and 2048 bits, no longer considered secure

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Cipher mode

A

Describes how an algorithm encrypts and decrypts data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Electronic codebook (ECB)

A

Context: you’ve encrypted plaintext with independent, individual block ciphers. The ECB is a library of sorts containing the keys and ciphertext.

Simulates a digital codebook providing an encrypted version of each possible input. Encrypting the same block with the same key results in identical ciphertext blocks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Cipherblock chaining (CBC)

A

Requires previous blocks to be encrypted, feeding previous blocks into the next block’s encryption using exclusive or logic

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Counter mode (CTR)

A

Uses a random value and a counter (beginning at 0), which are added and included in the encryption block, then proceeds using exclusive or logic. Allows a block cipher to behave more like a stream cipher.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Glaois/Counter mode (GCM)

A

Adds authentication to counter mode

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Steganography

A

Hiding information within another file