Cryptographic Solutions Flashcards
Cryptographic Solutions
practice of writing code to hide the true meaning of information
Cipher
algorithm that performs encryption or decryption
Key
the piece of information that determines the output of a cipher
Symmetric Algorithm
SINGLE KEY; both the sender and receiver must know the same shared secret key; Also called a private key algorithm
Asymmetric Algorithm
TWO DIFFERENT KEYS; where different keys are used for decryption and encryption
Hybrid Key Algorithm
using asymmetric algorithm to use a symmetric algorithm
Stream cipher
encrypts the data bit-by-bit or byte-by-byte in a continuous stream
Block Cipher
encrypts the data in fixed-sized blocks, typically 64/128/256 bits rather than one at a time
Data Encryption Standard (DES)
breaks the input into 64-bit blocks and uses transposition and substitution to create cipher text with a key length of 56-bits
Triple DES (3DES)
uses three separate keys in the process of encrypt → decrypt → encrypt in that order using each key
International Data Encryption Algorithm (IDEA)
breaks the input into 64-bit blocks with a key size of 128-bits; Blows
Advanced Encryption Standard (AES)
breaks the input input (128,192,256)-bit blocks with the same key size
Blowfish
uses 64-bit blocks and a variable (23-448) length encryption keys
Twofish
uses 128 bit blocks and uses 128, 192, 256 bit encryption keys.
RC cipher suite
The rivist ciphers
RC1, RC2, RC3
sucked
RC4
a stream cipher with 40 - 2048 bit size that is used in SSL and WEP.
RC5
a block cipher that key size is up to 2048 bits
RC6
based on the RC5, but was overshadowed by AES
Asymmetric algorithms
encrypt plain text with the target’s public key and then the target can decrypt this with the private key.
Digital Signature
a hash digest of a message encrypted with the sender’s private key to ensure non-repudiation.
Private Key Encrypts. Public Key Decrypts
(Digital Signatures)
Public Key Encrypts. Private Key Decrypts.
(Secure Message Communication)
Diffie-Hellman (DH)
used to conduct key exchanges and secure key distributions over its unsecured network, used for a key exchange inside of a VPN tunnel.