Ch12 - 12.02 - Symmetric Encryption Flashcards

1
Q

Symmetric Encryption

A

Symmetric encryption is a common encryption method that involves using the same key to encrypt and decrypt the message

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Symmetric Encryption Has Many Other Names, such as the Following:

A

Shared or preshared key
This name stems from the fact that you need to share the key with the person who is going to decrypt the information.

Secret Key
This name comes from the fact that you must keep the key secret from anyone who should not decrypt the information.

Secret algorithm
This is the symmetric algorithm that is performing the encryption. The term secret is often interchanged with symmetric, as it comes from the fact that the key should be kept secret from those who should not decrypt the message. Keep in mind that the algorithms are not secret; they are publically proven algorithms.

Session key
This name comes from the fact that many implementations of symmetric encryption use a random key, known as a session key, to do the encryption/decryption.

Private key
This name comes from the fact that you need to keep the
key private to only the parties who are to decrypt the information; otherwise, you lose confidentiality.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Pros n Cons of Symmetric Algo

A

Pros:
The advantage of symmetric encryption is that it is much faster than asymmetric encryption. If you are going to encrypt a large amount of information, you get a performance benefit by using symmetric encryption rather than asymmetric encryption.

Cons:
There are two major disadvantages to using symmetric encryption.

First, how do you communicate the key to the party who needs to decrypt the message? You must ensure that whatever way you communicate the key, it is sent in a
secure manner.

The second disadvantage to symmetric encryption is the number of keys required to ensure confidentiality among all persons. This means that in order to have three people encrypt messages for one another, you need to have three different symmetric keys for each person for secure communications. The number of keys dramatically rises as you increase the number of people who need to communicate. The following formula is used to calculate the number of symmetric keys that are required:

Keys = people × (people – 1) / 2

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Symmetric Encryption Algorithms

A
  1. Data Encryption Standard (DES)
  2. Blowfish
  3. Twofish
  4. Triple DES (3DES)
  5. Rivest Cipher (RC4/RC5)
  6. Advanced Encryption Standard (AES)
  7. AES256
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Data Encryption Standard (DES) - SymAlgo

A

DES is a block cipher that was selected as an American government standard in the 1970s. It is a 56- bit encryption algorithm. It is not considered secure by today’s standards.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Blowfish

A

This is a block cipher algorithm created by Bruce Schneier to replace the DES algorithm. It offers variable rates of encryption, from 1- to 448-bit encryption.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Twofish

A

Also written by Bruce Schneier, Twofish was created after Blowfish and offers 128-bit encryption.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Triple DES (3DES)

A

This is an improvement on DES that runs the information through three mathematical operations using three different 56-bit keys to create 168-bit encryption. Like DES, 3DES is a block cipher.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Rivest Cipher (RC4/RC5)

A

RC5 is a block cipher that was created by Ronald Rivest. There are different versions of the RC algorithm, such as RC4, which is a stream cipher used in SSL and WEP (for wireless security).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Advanced Encryption Standard (AES)

A

AES has replaced 3DES as the new standard for symmetric encryption algorithms. AES is a block cipher that supports 128-bit, 192-bit, and 256-bit encryption.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

AES256

A

If AES is used to encrypt data with 256-bit encryption, it is referred to as AES256, or AES-256, instead of just AES.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly