Cryptography Flashcards
Hashing
Number derived from performing a calculation on data.
Provides integrity assurances that data has not been modified.
Encryption
Scrambles, or ciphers, data to make it unreadable if intercepted. Encryption normally includes an algorithm and a key.
Encryption protects the
confidentiality of data.
Digital signatures
A digital signature is an encrypted hash
of a message, encrypted with the sender’s private key. Provide authentication, non-repudiation, and integrity
Message Digest 5 (MD5)
Hashing algorithm that produces a 128-bit hash
Secure Hash Algorithm (SHA)
Hashing algorithm. SHA-0, SHA-1: 160-bit SHA-2: 224, 256, 348, 512 bit SHA-3: 224, 256, 348, 512 bit
Hash-based Message Authentication Code
HMAC
Hashing algorithm.
Uses a shared secret key to add some randomness to the result and only the sender and receiver know the secret key.
Symmetric encryption
Uses the same key to encrypt and decrypt data.
- AES
- DES
- 3DES
- RC4
- Blowfish/Twofish
- One-Time Pad
Asymmetric encryption
Two keys in a matched pair to encrypt and decrypt data—a public key and a private key
- RSA
- Diffie-Hellman
- ECC
block cipher
Encrypts data in specific-sized blocks
stream ciphers
Encrypt data as a stream of bits
Advanced Encryption Standard (AES)
Symmetric block cipher encrypts data
in 128-bit blocks.
key sizes of 128 bits, 192 bits, or 256 bits
Data Encryption Standard (DES)
Encrypts data in 64-bit blocks.
56-bit key
3DES (pronounced as “Triple DES”)
Symmetric block cipher. encrypts data in 64-bit blocks.
key sizes of 56 bits, 112 bits, or 168 bits
RC4 (Rivest Cipher)
Symmetric stream cipher
Blowfish and Twofish
Strong symmetric block cipher
public key encrypts
Matching private key can decrypt
private key encrypts
Public key can decrypt
RSA
Asymmetric encryption method using both a public key and a private key in a
matched pair
Static Versus Ephemeral Keys
Static keys are semipermanent and stay the same over a long period of time. In contrast, ephemeral keys have
very short lifetimes and are recreated for each session.
Elliptic curve cryptography (ECC)
Asymmetric encryption method used with small wireless devices. graphs points on the curve to create keys
Diffie-Hellman
Asymmetric encryption method.
Key exchange algorithm used to privately share a symmetric key between two parties.
Diffie-Hellman Ephemeral (DHE) generating different keys for each session.
Elliptic Curve Diffie-Hellman Ephemeral (ECDHE)ephemeral keys generated
using ECC
Steganography
Hides data inside other data.
Email digital signatures
The sender’s private key encrypts (or signs).
The sender’s public key decrypts.
Email encryption
The recipient’s public key encrypts.
The recipient’s private key decrypts.