6.0 - Cryptography and PKI Flashcards

1
Q

What are the Symmetric Algorithms?

A
  • DES (Data Encryption Standard)
  • 3DES (Triple Data Encryption Standard)
  • IDEA (International Data Encryption Standard)
  • AES (Advanced Encryption Standard)
  • Blowfish
  • Twofish
  • RC4
  • RC5
  • RC6
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What are the Asymmetric Algorithms?

A
  • Diffie-Hellman
  • RSA
  • ECC (Elliptic Curve Cryptography)
  • DSA (Digital Signature Algorithm)
  • PGP (Pretty Good Privacy)
  • GPG (Gnu Privacy Guard)
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Which Algorithms use block ciphers?

A
  • DES (Digital Encryption Standard)
  • 3DES (Triple Digital Encryption Standard)
  • IDEA (International Data Encryption Algorithm)
  • AES (Advanced Encryption Standard)
  • Blowfish
  • Twofish
  • RC5
  • RC6
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Which Algorithms use stream ciphers?

A
  • RC 4
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

ECC Algorithm

A
  • Elliptic Curve Cryptography
  • heavily used in mobile devices (tablets, smart phones) because it requires less processing power
  • very efficient (6 times more efficient than RSA) and provides better security than an equivalent RSA key of the same size
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What are the Cipher modes?

A
  • CBC (Cipher Block Chaining)
  • GCM (Galois Counter Mode)
  • ECB (Electronic Code Book)
  • CTR (Counter)
  • stream
  • block
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

ECB Cipher mode

A
  • electronic code book
  • this mode of operation is the simplest cipher mode
  • algorithms that use ECB divide the plaintext into blocks and then encrypt each block using the same key
  • if any of the plaintext blocks are the same, the resulting ciphertext is the same, making it much easier to crack
  • ECB is not recommend for use in an cryptographic protocols today
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

CBC Cipher mode

A
  • cipher block chaining
  • is used by some symmetric block ciphers
  • because encryption of each block is dependent on the encryption of all previous blocks, CBC sometimes suffers from pipeline delays, making it less efficient than some other modes
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

CTR Cipher mode

A
  • counter mode effectively converts a block cipher into a stream cipher
  • combines an IV with a counter to encrypt each block
  • multiprocessor systems can encrypt or decrypt multiple blocks at the same time, allowing the algorithm to be quicker on multiprocessor or multi-core systems
  • is widely used and respected as a secure mode of operation
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

GCM Cipher mode

A
  • galois-counter mode
  • combines counter mode with hashing techniques for integrity
  • provides data authenticity (integrity) and confidentiality
  • encrypts the data for confidentiality and includes hashing techniques for integrity
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What are the hashing algorithms?

A
  • MD5 (Message Digest 5)
  • SHA (Secure Hashing Algorithm)
  • HMAC (Hashed Message Authentication Code)
  • RIPEMD (RACE Integrity Primitives Evaluation Message Digest)
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What are the key stretching algorithms?

A
  • BCRYPT

- PBKDF2 (Password-based Key Derivation Function 2)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Diffie-Hellman Algorithm

A
  • susceptible to man-in-the-middle so you need to use some form of authentication such as a password or digital certificate at the beginning of the exchange process
  • used for key exchange inside of creating a VPN tunnel establishment as part of IPSec
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Symmetric Encryption

A
  • symmetric algorithms or private key uses the same key to encrypt and decrypt data
  • when transmitting encrypted data, symmetric encryption algorithms use the same key to encrypt and decrypt data at both ends of the transmission media
How well did you know this?
1
Not at all
2
3
4
5
Perfectly