cryptographic concepts Flashcards
_____ is the main component of ECDHE that gives it perfect forward secrecy.
Ephemeral key
_____ uses ephemeral keys for each session which provide perfect forward secrecy.
ECDHE (ECC with D-H ephemeral mode)
Elliptic Curve Diffie Hellman Ephemeral
_____ is a framework in which encryption is used to protect an expanding collection of transactional data registered in a public ledger.
Blockchain
_____ is a trapdoor function used to generate public/private key pairs.
Elliptic Curve Cryptography (ECC)
_____ function on different physical principles as classical computing and could put the strength of current cryptographic ciphers at risk, but also has the promise of underpinning more secure cryptosystems.
Quantum computers
_____ is creating a key using thousands of rounds of hashing. Adding a salt in the hashing process makes the hash or key much stronger.
Key stretching
A _____ is where a function produces the same hash value for two different inputs.
collision
_____ is a two-way encryption algorithm in which encryption and decryption are both performed by a single secret key.
Symmetric encryption
___ is an asymmetric algorithm used to create digital signatures. It can be used to encrypt short messages.
RSA
_____ is an asymmetric algorithm used by NIST that adopts ElGamal’s algorithm. It uses the private and public keys from Diffie-Hellman in a similar way to RSA key pairs.
Digital Signature Algorithm (DSA)
_____ is a symmetric block cipher using 64-bit blocks and a 56-bit key.
Data Encryption Standard (DES)
_____ is a symmetric block cipher with a block size of 128 bits and key sizes of 128, 192, or 256 bits
Advanced Encryption Standard (AES)
This is faster and more secure than 3DES
___ is a stream cipher meaning each byte or bit of data in the plaintext is encrypted one at a time.
RC4
____ uses 64-bit blocks and a 56-bit key, but the plaintext is encrypted three times using different subkeys.
3DES
In a _____, the plaintext is divided into equal-size blocks (usually 64- or 128-bit). Each block is then subjected to complex transposition and substitution operations, based on the value of the key used.
block cipher