Crypto Flashcards

1
Q

MD5

A

128 Bit - Hash - Integrity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

SHA-1

A

160 Bit - Hash - Integrity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

SHA-2

A

224, 256, 384, 512 Bit Hash - Integrity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

HMAC-MD5

A

128 Bit - Hash with Shared Secret Key. Integrity and Authenticity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

HMAC-SHA1

A

160 Bit - Hash with Shared Secret Key. Integrity and Authenticity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

RIPEMD

A

160, 128, 256, 320 Bit Hashes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

LANMAN

A

Hash

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

NTLM, NTLMv2

A

Hash

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

How does Symmetric Encryption use keys?

A

Encrypts and Decrypts with the same key

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

How does Asymmetric Encryption use keys?

A

Matched key pair of a public key and private key

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Symmetric Encryption Algorithms (6)

A

AES, DES, 3DES, Blowfish, Twofish, RC4

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

AES Cipher

A

128 Bit Block

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

DES Cipher

A

64 Bit Block

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

3DES Cipher

A

64 Bit Block

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Blowfish Cipher

A

64 Bit Block

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Twofish Cipher

A

128 Bit Block

17
Q

RC4 Cipher

A

Stream

18
Q

AES Key Size

A

128, 192, 256 bit key

19
Q

DES Key Size

A

56 Bit Key

20
Q

3DES Key Size

A

56, 112, 168 Bit key

21
Q

Blowfish Key Size

A

32 to 448 Bit Key

22
Q

Twofish Key Size

A

128, 192, 256 Bit Key

23
Q

RC4 Key Size

A

40 - 2,048 Bit Key

24
Q

Diffie-Hellman

A

Key Exchange Algorithm to privately share a symmetric Key

25
Q

IPsec

A

Can Encrypt in Tunnel Mode or Transport Mode (between two systems)

26
Q

IPsec uses Authentication Header (AH) for what?

A

Authenticity & Integrity. Uses HMAC for AH

27
Q

CSR

A

Certificate Signing Request

28
Q

CRL

A

Certificate Revocation Library

29
Q

OCSP

A

Used for Cert Validation. Queries CA. Response is “good”, “revoked”, “unknown”

30
Q

PBKDF2

A

Key Stretching and Salting

Prevents Brute Force and Rainbow Table

31
Q

IDEA Cipher

A

64 Bit Block

32
Q

IDEA Key

A

128 Bit Key

33
Q

RC5 Cipher

A

32, 64, 128

34
Q

RC5 Key

A

0-2040

35
Q

CAST Cipher

A

64 Bit Block

36
Q

CAST Key

A

40-128

37
Q

SHA3

A

224, 256, 384, 512`