Cryptographic Solutions Flashcards
Symmetric Algorithm
Encryption algorithm in which both the sender and the receiver must know the same shared secret using a privately held key.
Private Key
Single Key
Asymmetric Algorithm
Encryption algorithm where different keys are used to encrypt and decrypt the data
Most common examples are Diffie-Hellman, RSA, and Elliptic Curve Cryptography (ECC)
Public Key
2 Different Keys
Stream Cipher
Utilizes keystream generator to encrypt data bit by bit using a mathematical XOR function to create ciphertext
Block Cipher
Breaks the input into fixed-length blocks of data and performs the encryption on each block
Data Encryption Standard (DES)
Symmetric Algorithm
Encryption algorithm which breaks the input into 64-bit blocks and uses transposition and substitution to create ciphertext using effective key strength of only 56 bits.
Triple DES (3DES)
Symmetric Algorithm
The encryption algorithm uses three separate symmetric keys to encrypt, decrypt, and then encrypt the plaintext into ciphertext to increase the strength of DES.
International Data Encryption Algorithm (IDEA)
Symmetric Algorithm
Symmetric Block Cipher uses 64-bit blocks to encrypt plaintext into ciphertext.
Advanced Encryption Standard (AES)
Symmetric Algorithm
Symmetric block cipher that uses 128-bit, 192-bit, or 256-bit blocks and a matching encryption key size to encrypt plaintext into ciphertext.
Blowfish
Symmetric Algorithm
Symmetric block cipher uses 64-bit blocks and a variable-length encryption key to encrypt plaintext into cipher.
Twofish
Symmetric Algorithm
It provides the ability to use 128-bit blocks in its encryption algorithm and uses 128-bit, 192-bit, or 256-bit encryption.
RC Cipher Suite
Symmetric Algorithms
It was created by Ron Rivest, a cryptographer who’s created six algorithms under the name “RC,” which stands for The Rivest Cipher.
RC4 - Symmetric stream cipher using a variable key size from 40 bits to 2048 bits that is used in SSL and WEP.
RC5 - Symmetric block cipher that uses key sizes up to 2048 bits.
RC6 - Symmetric block cipher that was introduced as a replacement for DES but AES was the chosen instead.
Diffie-Hellman (DH)
Asymmetric Algorithm
Used to conduct key exchanges and secure key distribution over an unsecured network.
Used for key exchange inside of creating a VPN tunnel establishment as part of IPSec.
RSA (Rivest, Shamir, and Adleman)
Asymmetric algorithm that relies on the mathematical difficulty of factoring large prime numbers.
Can support key sizes between 1024 bites and 4096 bits.
Elliptic Curve Cryptography (ECC)
Asymmetric Algorithm
Heavily used in mobile devices and it’s based on the algebraic structure of elliptical curves over finite fields to define its keys.
ECC with a 256-bit key is just as secure as RSA with a 2048-bit key.
Hashing
A one-way cryptographic function that takes an input and produces a unique message digest as its output.
The hash digest is always the same length.