6.2 Cryptography algorithms and their basic characteristics Flashcards
AES
(Advanced Encryption Standard) A symmetric 128-, 192-, or 256-bit block cipher based on the Rijndael algorithm developed by Belgian cryptographers Joan Daemen and Vincent Rijmen and adopted by the U.S. government as its encryption standard to replace DES.
DES
(Data Encryption Standard) Symmetric encryption protocol. DES and its replacement 3DES are considered weak in comparison with modern standards, such as AES.
Blowfish/Twofish
Blowfish: A freely available 64-bit block cipher algorithm that uses a variable key length.
Twofish: A symmetric key block cipher, similar to Blowfish, consisting of a block size of 128 bits and key sizes up to 256 bits.
CBC
(Cipher Block Chaining) An encryption mode of operation where an exclusive or (XOR) is applied to the first plaintext block.
GCM
(Galois/Counter Mode) An encryption mode of operation that adds authentication to the standard encryption services of a cipher mode.
ECB
(Electronic Code Book) An encryption mode of operation where each plaintext block is encrypted with the same key.
Counter Mode
(CTM) An encryption mode of operation where a numerical counter value is used to create a constantly changing IV.
RSA
RSA is widely deployed as a solution for creating digital signatures and key exchange.
DSA
(Digital Signature Algorithm) A public key encryption standard used for digital signatures that provides authentication and integrity verification for messages.
Diffie-Hellman
A key agreement protocol. It is used to securely agree on a key to encrypt messages using a symmetric encryption algorithm.
DHE
(Diffie-Hellman Ephemeral) A cryptographic protocol that is based on Diffie-Hellman and that provides for secure key exchange by using ephemeral keys.
ECDHE
(Elliptic Curve Diffie-Hellman Ephemeral) A cryptographic protocol that is based on Diffie-Hellman and that provides for secure key exchange by using ephemeral keys and elliptic curve cryptography.
Elliptic curve
A type of trapdoor function used to generate public/private key pairs.
PGP/GPG
(Pretty Good Privacy) A method of securing emails created to prevent attackers from intercepting and manipulating email and attachments by encrypting and digitally signing the contents of the email using public key cryptography.
(Gnu Privacy Guard) A popular open-source implementation of PGP.
MD5
The Message Digest Algorithm was designed in 1990 by Ronald Rivest, one of the “fathers” of modern cryptography. The most widely used version is MD5, released in 1991, which uses a 128-bit hash value. It is used in IPSec policies for data authentication.