Cryptographic Solutions Flashcards
Cryptography
Practice and study of writing and solving codes
- Encryption to hide information’s true meaning
Algorithm (Cipher)
Performs encryption or decryption
- MD5
- SHA Family
- RIPEMD
- HMAC
Key
Essential for determining cipher output
- example: ROT13
Key Length
Proportional to security
- longer key = higher security
Key Rotation
Best practice for security longevity
Symmetric Algorithms
- DES
- Triple DES
- IDEA
- AES
- Blowfish
- Twofish
- Rivest Cipher
Asymmetric Algorithms
- Diffie-Hellman
- RSA
- Elliptic Curve Cryptography
Symmetric Encryption
Uses a single key for both encryption and decryption
- Often referred to as private key encryption
- requires both sender and receiver to share the same secret key
- Offers confidentially but lacks non-repudiation
- Challenges with key distribution in large-scale usage because more people = more sharing of the keys
Asymmetric Encryption (Public Key Cryptography
Uses two separate keys
Public key for encryption/private key for decryption
- no need for shared keys
- slower compared to symmetric encryption but solves key distribution challenges
Commonly used algorithms:
- Diffie-Hellman
- RSA
- Elliptic Curve
Hybrid Approach
Combines both symmetric and asymmetric encryption for optimal benefits
- asymmetric encryption used to encrypt and share a key
- symmetric encryption used for bulk transfer, leveraging the shared secret key
- offers security and efficiency
Stream Cipher
Encrypts data bit-by-bit or byte-by-byte in a continuous stream
- uses a keys tram generator and exclusive XOR function for encryption
- suitable for real-time communication data streams like audio and video
- often used in symmetric algorithms
Block Cipher
Breaks input data into fixed-size blocks before encryption
- usually 64, 128, or 256 bits at a time
Padding added to smaller data blocks to fit the fixed block size
- advantages include ease of implementation and security
- can be implemented in software, whereas stream ciphers are often used in hardware solutions
Data Encryption Standard (DES)
- 64-bit key (56 effective bits due to parity)
- Encrypts data in 64-bit blocks through 16 rounds of transposition and substitution
- widely used from the 1970s to the early 2000s
Triple DES (3DES)
Utilizes three 56-bit keys
1. First key - encrypts
2. Second key - decrypts
3. Third key - encrypts
- provides 112-bit key strength but is slower than DES
International Data Encryption Algorithm (IDEA)
A symmetric block cipher with a 64-bit block size
- Uses a 128-bit key
- Faster and more secure than DES
= not as widely used as AES