Asymmetric and Symmetric Encryption Flashcards

1
Q

Substitution Cipher

A

where he moved each letter of the alphabet three places one

way or another.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

ROT 13

A

ROT 13 is a variation of the Caesar cipher. As there are 26 letters in the alphabet, we are rotating the letters 13 times

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Symmetric Encryption

A

only uses one key, which is known
as the secret key. The same key encrypts and decrypts the data. The danger of
symmetric encryption is that if the key is stolen, the attacker gets the keys to the
kingdom. The main reason for using symmetric encryption is that it can encrypt
large amounts of data very quickly. The Security+ exam does not focus on key
exchange, because it only uses one key, but instead focuses on which is the fastest or
strongest symmetric key
The symmetric encryptions are DES 56 bit, 3DES 168 bit, AES 256 bit, Twofish 128 bit, and Blowfish 64 bit. The smaller the key, the faster it is, but the larger the key, the more secure it is. largest key that would be
AES that can go up to 256 bits

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Asymmetric Encryption

A

Asymmetric encryption uses two keys; a private key and
a public key. If you think of the private key as your bank card, you will retain it and
never give it away. If you think of the public key as being a deposit slip, you will
give it to anyone as long as they pay money into your account. If you ever have to
install a key on a remote server, it will always be the public key as the private key
is always retained. When you see the word Public Key Infrastructure (PKI), it is
asymmetric encryption, complete with its CA and intermediary authorities. The
Security+ exam tests the use of both the private and public keys very thoroughly.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Diffie Hellman (DH)

A

When symmetric data is in
transit, it is protected by Diffie Hellman, whose main purpose is to create a secure
tunnel for symmetric data to pass through. It does not encrypt data but creates a
secure tunnel.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

TIP

A

Your private key, or a key pair, is never installed on another server. You always
retain the private key just like your bank card. You give the public key away or
install it on another server.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Non-repudiation

A

means that I cannot deny that it was me who signed the document

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Advanced Encryption Standard (AES) Symmetric

A

AES comes in three key strengths: 128-,

192-, and 256-bits. AES is commonly used for L2TP/IPSec VPNs

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Data Encryption Standard (DES) Symmetric

A

DES groups data into 64-bit blocks, but for the
purpose of the exam, it is seen as a 56-bit key, making it the fastest but weakest of
the symmetric algorithms. This could be used for L2TP/IPSec VPNs but is weaker
than AES.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Triple DES (3DES) Symmetric

A

3DES applies the DES key three times and is said to be a

168-bit key. This could be used for L2TP/IPSec VPNs but is weaker than AES.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Rivest Cipher 4 (RC4) Symmetric

A

RC4 is 40 bits and is used by WEP and is seen as a

stream cipher.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Blowfish and Twofish Symmetric

A

Blowfish is a 64-bit key and Twofish is a 128-bit key, and both were originally designed for encryption with embedded systems. How can you remember which of these is faster as they have similar names? Easy. I have a pond with fish inside and I have a challenge with a guy called Tom. I need to catch two
fish from the pond and he only needs to blow into the air. Guess what? He will win each time. Therefore, remember, Blowfish is faster than Twofish.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Asymmetric algorithms

A

use a PKI environment as they use two keys: a private key and a
public key

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Internet Key Exchange (IKE) Asymmetric

A

DH creates the keys used in the Internet Key Exchange (IKE); it uses UDP port 500
to set up the secure session for the L2TP/IPSec VPN. Once the secure tunnel has been
created, then the symmetrically encrypted data flows down the tunnel.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Rivest, Shamir, and Adelman (RSA) Asymmetric

A

A is named after the three people who
invented the algorithm. The keys were the first private and public key pairs, and
they start at 1,024, 2,048, 3,072, and 4,096 bits. They are used for encryption and
digital signatures.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Digital Signature Algorithm (DSA) Asymmetric

A

are used for digital signatures; they start at 512 bits, but their 1024-bit and 2048-bit keys are faster than RSA for
digital signatures.

17
Q

Elliptic Curve Cryptography (ECC) Asymmetric

A

ECC is a small, fast key that is used for
encryption in small mobile devices. However, AES-256 is used in military mobile
cell phones. It uses less processing than other encryptions.

18
Q

Ephemeral Keys Asymmetric

A

Ephemeral keys are short-lived keys. They are used for a single session, and there are two of them:

a. Diffie Hellman Ephemeral (DHE)
b. Elliptic Curve Diffie Hellman Ephemeral (ECDHE)

19
Q

Pretty Good Privacy (PGP) Asymmetric

A

is used between two users to set up asymmetric
encryption and digital signatures. For PGP to operate, you need a private and public
key pair. The first stage in using PGP is to exchange the keys.

20
Q

GnuPG Asymmetric

A

GnuPG is a free version of OpenPGP; it is also known as PGP.

21
Q

TIP

A

PGP is used for encryption between two people. S/MIME is used for digital
signature between two people

22
Q

Exclusive OR (XOR)

A

is a binary operand from Boolean algebra

23
Q

Key stretching

A

is where you append a random set of characters to a password to increase
the size of the password and its hash, ensuring that a brute-force attack needs more
compute time to crack the password

24
Q

BCRYPT

A

is a password-hashing algorithm based on the Blowfish cipher.
It is used to salt the passwords. A random string is appended to the password
to increase the password length to help increase the compute time for a bruteforce attack.

25
Q

PBKDF2

A

stores passwords with a random salt and with the password
hash using HMAC. It then iterates, which forces the regeneration of every password
and prevents any rainbow table attack. A rainbow table is a list of passwords and
their corresponding hash.

26
Q

Tip

A

Symmetric encryption is used to encrypt large amounts of data as they have
small, fast keys and use block ciphers.

27
Q

Salting

A

is a technique where random characters are appended to a password before it is
hashed. This makes the password longer; it is similar to key stretching and increases the
compute time for Brute Force attacks.