Cryptography Flashcards

1
Q

AES

A

Most popular block symmetric cipher for data
Low memory, so fast enough to be used for data streaming
Key lengths: 128, 192, 256
Block size: 128
From Rijndael cipher
Uses both confusion (substitution) and diffusion (transposition)
Used in WPA2, Kerberos, IPSEC

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

WPA2

A

Wi-Fi Protected Access II
AES 128 with CCMP
(CTR Mode with Cipher Block Chaining Message Authentication Code Protocol, AKA Counter Mode CBC-MAC)
Also allows AES with TKIP for legacy support
Supports enterprise mode (RADIUS)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

WEP

A
Wired Equivalent Protection
Weak, obsolete
Single static key
Limited # of short IVs, sent in plain text
Poor implementation of RC4
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

WPA

A
Wi-Fi Protected Access
Weak
TKIP (Temporal Key Integrity Protocol)
Stronger IV than WEP
Poor implementation of RC4
Supports enterprise mode (RADIUS)
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

RC4

A

ONLY STREAM cipher
Symmetric
Insecure
Used in WEP and WPA.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

MD5

A
Block asymmetric integrity cipher (makes digests)
Insecure but good for integrity
512 block size. 
128 bit digest. 
Used for password in RADIUS
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

SHA-3

A

Hash for integrity
New NIST standard
Secure
Digest size options: 224, 256, 384, 512.
Block sizes slightly more than twice digest: 576-1152.
Strength half digest: 128
Used in IPSEC

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

SHA-2

A
Hash for integrity
Old NIST standard
Secure
Makes the hash in PKI that RSA encrypts
Digest size options: 224, 256, 384, 512. 
Block sizes twice digest: 512-1024 . 
Strength half digest: 128
Block sizes 
Used in IPSEC
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

3DES

A

Block symmetric cipher (for data)
Less secure
3 X 56-bit key with 64-bit block
Can use one, two or three keys

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

RSA

A

Most popular Block asymmetric authenticity cipher (for signatures)
Used in PKI: encrypts the hash using the sender’s private key, and then unencrypts it using the sender’s public key
Based on factorization: factoring two large prime numbers
Based on Diffie-Helman
Needs at least 2048-bit key for security.
Block size is 1/8 of key size

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Symmetric encryption

A

Used to exchanges data
Encryption and decryption keys are same
A.k.a. session key, private key, shared key, secret key.
Pro: fast.
Cons: less secure, key exchange not secure, not practical for large groups due to need for many bilateral shared keys, no integrity or authentication

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

IDEA

A

Block symmetric cipher for data
PGP uses this symmetric block cipher.
Proprietary.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Asymmetric encryption

A

Used to exchange keys.
Keys are different, like public and private keys;
Con: slow.
Pros: secure key exchange, scalable through PKI, provides integrity and authentication.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

El Gamal

A

Block asymmetric authenticity cipher (for signatures)

Ciphertext is always twice the size of plain text.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Blake2

A

Hash for integrity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

DSA

A

Block asymmetric authenticity cipher (for signatures).

NIST recommends 2048 keys.

17
Q

EC-DSA

A

Block asymmetric authenticity cipher (for signatures)

Elliptic curve DSA, for cell phones

18
Q

Blowfish, Twofish

A

Block symmetric ciphers for data
uses prewhitening and postwhitening.
Twofish was an AES finalist.

19
Q

Streaming symmetric ciphers (for data)

A

RC4

20
Q

Block symmetric ciphers (for data)

A
AES
3DES
Blowfish
Twofish
Skipjack
IDEA
21
Q

Block asymmetric hash algorithms

A
Output: MAC, HMAC.
CIA: Integrity.
List:
- SHA-1
- SHA-2
- SHA-3
- MD5
- Blake2
22
Q

Block asymmetric ciphers

Describe output, CIA purpose and list names

A
Output: public and private keys
CIS: Authenticity
List: 
- RSA
- DSA
- Elliptic Curve DSA
- El Gamal
- Diffie-Hellman
- Knapsack
23
Q

Two algorithm methods used in asymmetric ciphers

A
  • discrete logarithm (Diffie-Hellman, El Gamal)

- factorization algorithm

24
Q

Skipjack

A

Block symmetric

Former classified cipher often used by hardware.

25
Q

DES

A

Block symmetric

Key size 156, block size 64

26
Q

SHA-1

A

Hash for integrity
Insecure
Block size 512
Digest size 160.

27
Q

Diffie-Hellman

A

Secure key exchange

28
Q

HAVAL, RIPEMD-160, Tiger, Whirlpool

A

Hashes

29
Q

MAC vs. HMAC vs. Digital Signature

A
  • MAC: hashed message
  • HMAC: hashed, then encrypted with session key
  • Digital Signature: hashed, then encrypted with private key