Cryptography Flashcards
Kerberos Structure
Default Authentication protocol/method. Symmetric and asymmetric. Made up of a Key distribution Center (KDC) Authentication Server (AS) Ticket Granting Service (TGS) Ticket Granting Ticket (TGT)
DES
Block Cipher 56 bit outdated, Symmetric
3DES
Block cipher (3 x 56) 168 bit key. Can use up to 3 keys much slower than des
AES
block cipher uses 256 keys bits replaces DES much faster
IDEA
Symmetric key block cipher uses 128 used in PGP originally
Twofish
symmetric key block cipher of about 128 bit blocks keys up to 256
Blowfish
Symmetric block. variable key from 32 to 448 64 bit block size feistel cipher pub domain
RC (rivest Cipher)
rc2 - rc6
Diffie-hellman
Asymmetric Key exchange protocol. used in ssl and ipsec. can be vuln to mitm if signature waived
El Gamal
Asymmetric key based on diffie-hellman. used in PGP now. to solve discrete problems for encryption and digital signatures
RSA
strong uses two prime numbers. Factoring numbers creates keys up to 4096. Encryption and digital signatures.
MD5
128 bit hash 32 digit hexadecimal
Sha-1
160 bit value out
sha-2
224, 256, 384 512 bit output
RIPE-MD
The # indicates the bit length. works through 80 stages and then through modulo 32