6.0 Cryptography & PKI Flashcards
Symmetric algorithm
Uses the same key to encrypt and decrypt data. Also known as secret key encryption.
DES
Data Encryption Standard. Symmetric block cipher. Encrypts data in 64-bit blocks with key of only 56 bits. Should not be used.
3DES (TDES)
Triple Data Encryption Standard. Symmetric block cipher. It encrypts data using the DES algorithm in three separate passes and uses multiple keys. Goes through 48 rounds when encrypting plaintext. Still used when legacy hardware doesn’t support AES.
AES
Advanced Encryption Standard. Strong symmetric block cipher that encrypts data in 128-bit blocks. The National Institute of Standards and Technology (NIST) adopted AES from the Rijndael encryption algorithm
Blowfish
Strong symmetric block cipher that is still widely used today. It encrypts data in 64-bit blocks and supports key sizes between 32 and 448 bits
Twofish
Related to Blowfish, but encrypts data in 128-bit blocks and it supports 128-, 192-, or 256-bit keys
RC4 (or ARC4)
Symmetric stream cipher and it can use between 40 and 2048 bit keys
IDEA
International Data Encryption Algorithm. Symmetric block cipher which uses 64-bit blocks to encrypt plaintext into Ciphertext with a 128-bit key. IDEA is used in PGP. Developed in Switzerland
GOST
Russian private key encryption standard that uses a 256-bit encryption key. GOST was developed as a counter to the Data Encryption Standard (DES). 64-bit block size. Symmetric block cipher
CAST-128 (or CAST5)
Symmetric key block cipher used in PGP and GPG
RC5
Private key encryption standard developed at MIT. Symmetric block cipher
Asymmetric algorithms
Also known as public key algorithms. The public key can be shared with anyone, whereas the private key is possessed only by the owner. The public key is used to encrypt the data while the private key is used to decrypt the data. Asymmetric ciphers use random number generation
Diffie-Hellman
A key exchange algorithm used to privately share a symmetric key between two parties
Diffie-Hellman Ephemeral
Uses ephemeral keys, generating different keys for each session
Elliptic Curve Diffie-Hellman Exchange
Uses ephemeral keys generated using ECC, another version ECDH, uses static keys
Elliptic Curve Diffie-Hellman (ECDH)
A key exchange protocol used in Public Key Infrastructure (PKI). It allows for establishing shared secrets between two parties