Cryptography Flashcards
Kerberos Structure
Default Authentication protocol/method. Symmetric and asymmetric. Made up of a Key distribution Center (KDC) Authentication Server (AS) Ticket Granting Service (TGS) Ticket Granting Ticket (TGT)
DES
Block Cipher 56 bit outdated, Symmetric
3DES
Block cipher (3 x 56) 168 bit key. Can use up to 3 keys much slower than des
AES
block cipher uses 256 keys bits replaces DES much faster
IDEA
Symmetric key block cipher uses 128 used in PGP originally
Twofish
symmetric key block cipher of about 128 bit blocks keys up to 256
Blowfish
Symmetric block. variable key from 32 to 448 64 bit block size feistel cipher pub domain
RC (rivest Cipher)
rc2 - rc6
Diffie-hellman
Asymmetric Key exchange protocol. used in ssl and ipsec. can be vuln to mitm if signature waived
El Gamal
Asymmetric key based on diffie-hellman. used in PGP now. to solve discrete problems for encryption and digital signatures
RSA
strong uses two prime numbers. Factoring numbers creates keys up to 4096. Encryption and digital signatures.
MD5
128 bit hash 32 digit hexadecimal
Sha-1
160 bit value out
sha-2
224, 256, 384 512 bit output
RIPE-MD
The # indicates the bit length. works through 80 stages and then through modulo 32
CA
3rd party creates and issues digital certificates used to verify identity. keeps track of all certificates within the system. Maintain CRL. Public Key
RA
RA is responsible for accepting requests for digital certificates and authenticating the entity making the request. An entity that is responsible for one or more of the following functions: the identification and authentication of certificate applicants, the approval or rejection of certificate applications, initiating certificate revocations or suspensions under certain circumstances, processing subscriber requests to revoke or suspend their certificates, and approving or rejecting requests by subscribers to renew or re-key their certificates. RAs, however, do not sign or issue certificates (i.e., an RA is delegated certain tasks on behalf of a CA)
Block Cipher 56 bit outdated, Symmetric
DES
Block cipher 168 bit key. Can use up to 3 keys much slower than des
3DES
block cipher uses 128, 192, 256 keys bits replaces DES much faster
AES
block uses 128 used in PGP originally
IDEA
symmetric key block cipher of about 128 bit blocks keys up to 256
Twofish
rc2 - rc6
Rivest
Asymmetric Key exchange protocol. used in ssl and ipsec. can be vuln to mitm if signature waived
Diffie-hellman
Asymmetric key based of diffie-hellman. used in PGP now. to solve discrete problems for encryption and digital signatures
El Gamal
strong uses two prime numbers. Factoring numbers creates keys up to 4096. Encrypion and digital signatures
RSA
128 bit hash 32 digit hexadecimal
MD5
160 bit value out
Sha-1
224, 256, 384 512 bit output
sha-2
The # indicates the bit length. works through 80 stages and then through modulo 32
RIPE-MD
3rd party creates and issues digital certificates used to verify identity. keeps track of all certificates within the system. Maintain CRL. Public Key
CA
is responsible for accepting requests for digital certificates and authenticating the entity making the request. An entity that is responsible for one or more of the following functions: the identification and authentication of certificate applicants, the approval or rejection of certificate applications, initiating certificate revocations or suspensions under certain circumstances, processing subscriber requests to revoke or suspend their certificates, and approving or rejecting requests by subscribers to renew or re-key their certificates. RAs, however, do not sign or issue certificates (i.e., an RA is delegated certain tasks on behalf of a CA)
RA