Cryptographic Solutions Flashcards
Symmetric Encryption
■ Uses a single key for both encryption and decryption
■ Often referred to as private key encryption
■ Requires both sender and receiver to share the same secret key
■ Offers confidentiality but lacks non-repudiation
■ Challenges with key distribution in large-scale usage
Asymmetric Encryption
■ Uses two separate keys
● Public key for encryption
● Private key for decryption
■ Often called “Public Key Cryptography”
■ No need for shared secret keys
■ Commonly used algorithms include Diffie-Hellman, RSA, and Elliptic Curve
Cryptography (ECC)
■ Slower compared to symmetric encryption but solves key distribution challenges
Hybrid Approach
■ Combines both symmetric and asymmetric encryption for optimal benefits
■ Asymmetric encryption used to encrypt and share a secret key
■ Symmetric encryption used for bulk data transfer, leveraging the shared secret
key
■ Offers security and efficiency
Stream Cipher
■ Encrypts data bit-by-bit or byte-by-byte in a continuous stream
■ Uses a keystream generator and exclusive XOR function for encryption
■ Suitable for real-time communication data streams like audio and video
■ Often used in symmetric algorithms
Block Cipher
■ Breaks input data into fixed-size blocks before encryption
● Usually 64, 128, or 256 bits at a time
■ Padding added to smaller data blocks to fit the fixed block size
■ Advantages include ease of implementation and security
■ Can be implemented in software, whereas stream ciphers are often used in
hardware solutions
Symmetric Algorithms
DES
3DES
IDEA
AES
Blowfish
Twofish
RC Cipher Suite
DES
Data Encryption Standard
64-bit key
56-bit strength
Deprecated
3DES
Triple DES
Three 56-bit keys
Provides 112-bit strength
Slower than DES
IDEA
International Data Encryption Algorithm
128-bit key
Faster and more secure than DES
AES
Advanced Encryption Standard
Replaced DES and 3DES as US gvt encryption standard
Supports 128-bit, 192-bit, or 256-bit keys
Widelely adopted. Standard encryption for sensitive unclassified information
Blowfish
DES replacement
32 to 448 bits key size
Not widely adopted
Twofish
Open source and available for use
Supports 128, 192, or 256 bits key size
RC Cipher suite
RC4: stream cipher with keys from 40 to 2048 bits. Used in SSL and WEP
RC5: Block cipher up to 2048 bits
RC6: based on RC5, DES replacement
Asymmetric Algorithms
Diffie-Hellman
RSA
ECC
Diffie-Hellman
● Used for key exchange and secure key distribution
● Vulnerable to man-in-the-middle attacks, requires authentication
● Commonly used in VPN tunnel establishment (IPSec)
RSA
Rivest, Shamir, Adleman
● Used for key exchange, encryption, and digital signatures
● Relies on the mathematical difficulty of factoring large prime numbers
● Supports key sizes from 1024 to 4096 bits
● Widely used in organizations and multi-factor authentication
ECC
Elliptic Curve Cryptography
● Efficient and secure, uses algebraic structure of elliptical curves
● Commonly used in mobile devices and low-power computing
● Six times more efficient than RSA for equivalent security
ECC variants
○ ECDH (Elliptic Curve Diffie-Hellman)
○ ECDHE (Elliptic Curve Diffie-Hellman Ephemeral)
○ ECDSA (Elliptic Curve Digital Signature Algorithm)
Hashing
One-way cryptographic function that produces a unique message digest from an input