ch 13 Encryption and Hashing Concepts Flashcards
LANMAN hash ,
store Windows passwords
disabled on operating systems
birthday attack
n attack on a hashing
system that attempts to send two different messages with the same hash function,
causing a collision
MD5 Hash
128-bit key.
SHA-1
SHA-2
160-bit hash,
s 256-
bit and 512-bit block sizes
RSA Public and Private Key Usage
Table 13-4 Summary of RSA Public and Private Key Usage
Task Which person’s key to use What kind of key
Send an encrypted message Receiver’s Public key
Decrypt an encrypted message Receiver’s Private key
Send an encrypted signature Sender’s Private key
Decrypt an encrypted signature Sender’s Public key
Summary of Symmetric Algorithms
DES Data Encryption Standard 56-bit
3DES Triple DES 168-bit
AES Advanced Encryption
Standard
256-bit
RC4 Rivest Cipher version 4 128-bit typical
RC5 Rivest Cipher version 5 64-bit typical
RC6 Rivest Cipher version 6 256-bit typical
Twofish Twofish 128-, 192-, 256-bit
Asymmetric key algorithms
different keys to encrypt and decrypt
symmetric key algorithms:
A stream cipher is a type of algorithm that encrypts each binary digit in the
data stream, one bit at a time.
■ A block cipher is a type of algorithm that encrypts a group of bits collectively
as individual units known as blocks. For example, the Advanced Encryption
Standard (AES) algorithm can use 128-bit or 256-bit block ciphers.
ASE encryption
AES-128, AES-192,
and AES-256. Actually, each of these has the same 128-bit cipher block size, but the
key sizes for each are 128-bit, 192-bit, and 256-bit, respectively.
Steganography
the science (and art) of writing hidden messages; it is a form of security through obscurity
cipher
algorithm that can perform encryption or decryption
cryptography
hiding the meaning of the information.