Cryptographic Solutions Flashcards

1
Q

Cryptography

A

Practice and study of writing and solving codes
- Encryption to hide information’s true meaning

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Algorithm (Cipher)

A

Performs encryption or decryption

  • MD5
  • SHA Family
  • RIPEMD
  • HMAC
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Key

A

Essential for determining cipher output

  • example: ROT13
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Key Length

A

Proportional to security
- longer key = higher security

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Key Rotation

A

Best practice for security longevity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Symmetric Algorithms

A
  • DES
  • Triple DES
  • IDEA
  • AES
  • Blowfish
  • Twofish
  • Rivest Cipher
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Asymmetric Algorithms

A
  • Diffie-Hellman
  • RSA
  • Elliptic Curve Cryptography
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Symmetric Encryption

A

Uses a single key for both encryption and decryption
- Often referred to as private key encryption
- requires both sender and receiver to share the same secret key
- Offers confidentially but lacks non-repudiation
- Challenges with key distribution in large-scale usage because more people = more sharing of the keys

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Asymmetric Encryption (Public Key Cryptography

A

Uses two separate keys
Public key for encryption/private key for decryption
- no need for shared keys
- slower compared to symmetric encryption but solves key distribution challenges

Commonly used algorithms:
- Diffie-Hellman
- RSA
- Elliptic Curve

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Hybrid Approach

A

Combines both symmetric and asymmetric encryption for optimal benefits
- asymmetric encryption used to encrypt and share a key
- symmetric encryption used for bulk transfer, leveraging the shared secret key
- offers security and efficiency

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Stream Cipher

A

Encrypts data bit-by-bit or byte-by-byte in a continuous stream
- uses a keys tram generator and exclusive XOR function for encryption
- suitable for real-time communication data streams like audio and video
- often used in symmetric algorithms

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Block Cipher

A

Breaks input data into fixed-size blocks before encryption
- usually 64, 128, or 256 bits at a time

Padding added to smaller data blocks to fit the fixed block size
- advantages include ease of implementation and security
- can be implemented in software, whereas stream ciphers are often used in hardware solutions

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Data Encryption Standard (DES)

A
  • 64-bit key (56 effective bits due to parity)
  • Encrypts data in 64-bit blocks through 16 rounds of transposition and substitution
  • widely used from the 1970s to the early 2000s
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Triple DES (3DES)

A

Utilizes three 56-bit keys
1. First key - encrypts
2. Second key - decrypts
3. Third key - encrypts

  • provides 112-bit key strength but is slower than DES
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

International Data Encryption Algorithm (IDEA)

A

A symmetric block cipher with a 64-bit block size
- Uses a 128-bit key
- Faster and more secure than DES
= not as widely used as AES

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Advanced Encryption Standard (AES)

A

Symmetric
Replaced DES and 3DES as the US government encryption standard
- Supports 128-bit, 192-bit, or 256-bit keys and matching block sizes
- widely adopted and considered the encryption standard for sensitive unclassified information

17
Q

Blowfish

A

Symmetric
A block cipher with key sizes ranging from 32 to 448 bits
- developed as a DES replacement but not widely adopted

18
Q

Twofish

A

Symmetric
A block cipher supporting 128-bit block size and key sizes of 128, 192, or 256 bits
- open source and available for use

19
Q

RC Cipher Suite (RC4, RC5, RC6)

A

Symmetric
Created by cryptographer, Ron Rivest
- RC4 is a stream cipher with variable key sizes from 40 to 2048 bits, used in SSL and WEP
- RC5 - a block cipher with key sizes up to 2048 bits
- RC6 - Based on RC5, was considered as a DES replacement

20
Q
A