Cryptographic Solutions Flashcards
Cryptography
Practice and study of writing and solving codes
- Encryption to hide information’s true meaning
Algorithm (Cipher)
Performs encryption or decryption
- MD5
- SHA Family
- RIPEMD
- HMAC
Key
Essential for determining cipher output
- example: ROT13
Key Length
Proportional to security
- longer key = higher security
Key Rotation
Best practice for security longevity
Symmetric Algorithms
- DES
- Triple DES
- IDEA
- AES
- Blowfish
- Twofish
- Rivest Cipher
Asymmetric Algorithms
- Diffie-Hellman
- RSA
- Elliptic Curve Cryptography
Symmetric Encryption
Uses a single key for both encryption and decryption
- Often referred to as private key encryption
- requires both sender and receiver to share the same secret key
- Offers confidentially but lacks non-repudiation
- Challenges with key distribution in large-scale usage because more people = more sharing of the keys
Asymmetric Encryption (Public Key Cryptography
Uses two separate keys
Public key for encryption/private key for decryption
- no need for shared keys
- slower compared to symmetric encryption but solves key distribution challenges
Commonly used algorithms:
- Diffie-Hellman
- RSA
- Elliptic Curve
Hybrid Approach
Combines both symmetric and asymmetric encryption for optimal benefits
- asymmetric encryption used to encrypt and share a key
- symmetric encryption used for bulk transfer, leveraging the shared secret key
- offers security and efficiency
Stream Cipher
Encrypts data bit-by-bit or byte-by-byte in a continuous stream
- uses a keys tram generator and exclusive XOR function for encryption
- suitable for real-time communication data streams like audio and video
- often used in symmetric algorithms
Block Cipher
Breaks input data into fixed-size blocks before encryption
- usually 64, 128, or 256 bits at a time
Padding added to smaller data blocks to fit the fixed block size
- advantages include ease of implementation and security
- can be implemented in software, whereas stream ciphers are often used in hardware solutions
Data Encryption Standard (DES)
- 64-bit key (56 effective bits due to parity)
- Encrypts data in 64-bit blocks through 16 rounds of transposition and substitution
- widely used from the 1970s to the early 2000s
Triple DES (3DES)
Utilizes three 56-bit keys
1. First key - encrypts
2. Second key - decrypts
3. Third key - encrypts
- provides 112-bit key strength but is slower than DES
International Data Encryption Algorithm (IDEA)
A symmetric block cipher with a 64-bit block size
- Uses a 128-bit key
- Faster and more secure than DES
= not as widely used as AES
Advanced Encryption Standard (AES)
Symmetric
Replaced DES and 3DES as the US government encryption standard
- Supports 128-bit, 192-bit, or 256-bit keys and matching block sizes
- widely adopted and considered the encryption standard for sensitive unclassified information
Blowfish
Symmetric
A block cipher with key sizes ranging from 32 to 448 bits
- developed as a DES replacement but not widely adopted
Twofish
Symmetric
A block cipher supporting 128-bit block size and key sizes of 128, 192, or 256 bits
- open source and available for use
RC Cipher Suite (RC4, RC5, RC6)
Symmetric
Created by cryptographer, Ron Rivest
- RC4 is a stream cipher with variable key sizes from 40 to 2048 bits, used in SSL and WEP
- RC5 - a block cipher with key sizes up to 2048 bits
- RC6 - Based on RC5, was considered as a DES replacement