Crypto Flashcards
MD5
128 Bit - Hash - Integrity
SHA-1
160 Bit - Hash - Integrity
SHA-2
224, 256, 384, 512 Bit Hash - Integrity
HMAC-MD5
128 Bit - Hash with Shared Secret Key. Integrity and Authenticity
HMAC-SHA1
160 Bit - Hash with Shared Secret Key. Integrity and Authenticity
RIPEMD
160, 128, 256, 320 Bit Hashes
LANMAN
Hash
NTLM, NTLMv2
Hash
How does Symmetric Encryption use keys?
Encrypts and Decrypts with the same key
How does Asymmetric Encryption use keys?
Matched key pair of a public key and private key
Symmetric Encryption Algorithms (6)
AES, DES, 3DES, Blowfish, Twofish, RC4
AES Cipher
128 Bit Block
DES Cipher
64 Bit Block
3DES Cipher
64 Bit Block
Blowfish Cipher
64 Bit Block
Twofish Cipher
128 Bit Block
RC4 Cipher
Stream
AES Key Size
128, 192, 256 bit key
DES Key Size
56 Bit Key
3DES Key Size
56, 112, 168 Bit key
Blowfish Key Size
32 to 448 Bit Key
Twofish Key Size
128, 192, 256 Bit Key
RC4 Key Size
40 - 2,048 Bit Key
Diffie-Hellman
Key Exchange Algorithm to privately share a symmetric Key
IPsec
Can Encrypt in Tunnel Mode or Transport Mode (between two systems)
IPsec uses Authentication Header (AH) for what?
Authenticity & Integrity. Uses HMAC for AH
CSR
Certificate Signing Request
CRL
Certificate Revocation Library
OCSP
Used for Cert Validation. Queries CA. Response is “good”, “revoked”, “unknown”
PBKDF2
Key Stretching and Salting
Prevents Brute Force and Rainbow Table
IDEA Cipher
64 Bit Block
IDEA Key
128 Bit Key
RC5 Cipher
32, 64, 128
RC5 Key
0-2040
CAST Cipher
64 Bit Block
CAST Key
40-128
SHA3
224, 256, 384, 512`