3.1 Krypto Flashcards

1
Q

Hashing

A
HAVAL 128,160,192,224,256
HMAC variabel
MD2 128
MD4 128 
MD5 128
SHA1 160
SHA2 224,256,384,512
SHA3 224,256,384,512
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

PGP commercial

A

RSA key exchange
IDEA encryption
MD5 hashing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

PGP freeware

A

DH key exchange
CAST-128 encryption
SHA1 hashing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

S/MIME

A

RSA key exchange
AES/3DES encryption -> HYBRID
uses X.509, PKI

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

IPSEC

A

Authentication Header: provides integrity, authentication and non-repudiation, access control, prevents replay attacks, acts as a digital signature

Encapsulating Security Payload ESP provides confidentiality (and optionally integrity/authentication), prevents replay attacks

Security Association SA (roadie): 4 SAs for bidirectional communications with AH and ESP

ISAKMP: Internet Security Assicoation and Key Management Protocol: creates and manages SAs (authenticate, key generation)

tunnel mode is required for X-gateway!

AH+ESP in transport mode because headers are not encrypted
only ESP in tunnel mode because headers are encrpyted

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

WLAN

A

WEP: 64/128
WPA: uses TKIP
WPA2: adds AES

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

IDEA

A

Block 64
Key 128
uses ECB, CBC, CFB, OFB, CTR

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Blowfish

A

Block 64
Key 32-448
much faster than IDEA and DES, license free

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Skipjack

A

Block 64
Key 80
ECB, CBC, OFB, CTR
key escrow at NIST

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

AES

A

Block 128
Key: 128,192,256
10/12/24 rounds

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Twofish

A

Block 128

Key: 1-256

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

DES

A
Block 64
Key 64 (effectively 56)
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

3DES

A

Block 64

Key 112/168 (3x56 bit keys possible)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

RC2

A

Block 64

Key 128

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

RC4

A

Streaming Cipher!

Key 128

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

RC5

A

Block 32,64,128

Key 0-2040

17
Q

number of symmetric keys

A

n-1 /2

18
Q

security static asymmetric key length

A

elliptic curve most secure

RSA requires longer key

19
Q

Digital Signature Standard

DSS

A

uses SHA2 hashing

uses DSA/RSA/ECDSA encryption

20
Q

El Gamal

A

based on DH

doubles the length of any message

21
Q

IKE

Internet Key Exchange

A

provides peer authorization and key exchange

algorithm selection on both sides to choose highest level of security

phase1: authentication, security association, DH agreement
phase2: generate keys for IPSEC

22
Q

cross certification

A

create trust between different PKIs/hierachies

23
Q

revocation request grace period

A

time between requesting revocation and publication of that info

24
Q

key clustering

A

plaintext message generates same ciphertext messages with the use of same key and algorithm

25
Q

ISAKMP

A

manages SA creation process in IPSEC

26
Q

PGP

A

CIA+nonrep
email, doc and full drive encryption
uses web of trust

27
Q

Transposition

A

Transposition adds diffusion

Substitution adds confusion