6.2 Cryptography algorithms and their basic characteristics Flashcards

1
Q

AES

A

(Advanced Encryption Standard) A symmetric 128-, 192-, or 256-bit block cipher based on the Rijndael algorithm developed by Belgian cryptographers Joan Daemen and Vincent Rijmen and adopted by the U.S. government as its encryption standard to replace DES.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

DES

A

(Data Encryption Standard) Symmetric encryption protocol. DES and its replacement 3DES are considered weak in comparison with modern standards, such as AES.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Blowfish/Twofish

A

Blowfish: A freely available 64-bit block cipher algorithm that uses a variable key length.
Twofish: A symmetric key block cipher, similar to Blowfish, consisting of a block size of 128 bits and key sizes up to 256 bits.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

CBC

A

(Cipher Block Chaining) An encryption mode of operation where an exclusive or (XOR) is applied to the first plaintext block.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

GCM

A

(Galois/Counter Mode) An encryption mode of operation that adds authentication to the standard encryption services of a cipher mode.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

ECB

A

(Electronic Code Book) An encryption mode of operation where each plaintext block is encrypted with the same key.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Counter Mode

A

(CTM) An encryption mode of operation where a numerical counter value is used to create a constantly changing IV.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

RSA

A

RSA is widely deployed as a solution for creating digital signatures and key exchange.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

DSA

A

(Digital Signature Algorithm) A public key encryption standard used for digital signatures that provides authentication and integrity verification for messages.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Diffie-Hellman

A

A key agreement protocol. It is used to securely agree on a key to encrypt messages using a symmetric encryption algorithm.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

DHE

A

(Diffie-Hellman Ephemeral) A cryptographic protocol that is based on Diffie-Hellman and that provides for secure key exchange by using ephemeral keys.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

ECDHE

A

(Elliptic Curve Diffie-Hellman Ephemeral) A cryptographic protocol that is based on Diffie-Hellman and that provides for secure key exchange by using ephemeral keys and elliptic curve cryptography.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Elliptic curve

A

A type of trapdoor function used to generate public/private key pairs.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

PGP/GPG

A

(Pretty Good Privacy) A method of securing emails created to prevent attackers from intercepting and manipulating email and attachments by encrypting and digitally signing the contents of the email using public key cryptography.

(Gnu Privacy Guard) A popular open-source implementation of PGP.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

MD5

A

The Message Digest Algorithm was designed in 1990 by Ronald Rivest, one of the “fathers” of modern cryptography. The most widely used version is MD5, released in 1991, which uses a 128-bit hash value. It is used in IPSec policies for data authentication.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

SHA

A

(Secure Hash Algorithm) A cryptographic hashing algorithm created to address possible weaknesses in MDA. The current version is SHA-2.

17
Q

HMAC

A

(hash-based message authentication code) A method (described in RFC-2104) used to verify both the integrity and authenticity of a message by combining cryptographic hash functions, such as MD5 or SHA-1, with a secret key.

18
Q

RIPEMD

A

(RACE Integrity Primitives Evaluation Message Digest) A message digest algorithm designed as an alternative to MD5 and SHA.

19
Q

bcrypt

A

A key-derivation function based on the Blowfish cipher algorithm.

20
Q

PBKDF2

A

(Password-Based Key Derivation Function 2) A key derivation function used in key stretching to make potentially weak cryptographic keys such as passwords less susceptible to brute force attacks.

21
Q

Obfuscation

A

A technique that essentially “hides” or “camouflages” code or other information so that it is harder to read by unauthorized users.

22
Q

XOR

A

(exclusive OR) An operation that outputs to true only if one input is true and the other input is false.

23
Q

ROT13

A

A caesarian/substitution cipher that rotates each letter 13 places.

24
Q

Substitution ciphers

A

An obfuscation technique where each unit of plaintext is kept in the same sequence when converted to ciphertext, but the actual value of the unit changes.