Cryptography Flashcards
Hashing
Number derived from performing a calculation on data.
Provides integrity assurances that data has not been modified.
Encryption
Scrambles, or ciphers, data to make it unreadable if intercepted. Encryption normally includes an algorithm and a key.
Encryption protects the
confidentiality of data.
Digital signatures
A digital signature is an encrypted hash
of a message, encrypted with the sender’s private key. Provide authentication, non-repudiation, and integrity
Message Digest 5 (MD5)
Hashing algorithm that produces a 128-bit hash
Secure Hash Algorithm (SHA)
Hashing algorithm. SHA-0, SHA-1: 160-bit SHA-2: 224, 256, 348, 512 bit SHA-3: 224, 256, 348, 512 bit
Hash-based Message Authentication Code
HMAC
Hashing algorithm.
Uses a shared secret key to add some randomness to the result and only the sender and receiver know the secret key.
Symmetric encryption
Uses the same key to encrypt and decrypt data.
- AES
- DES
- 3DES
- RC4
- Blowfish/Twofish
- One-Time Pad
Asymmetric encryption
Two keys in a matched pair to encrypt and decrypt data—a public key and a private key
- RSA
- Diffie-Hellman
- ECC
block cipher
Encrypts data in specific-sized blocks
stream ciphers
Encrypt data as a stream of bits
Advanced Encryption Standard (AES)
Symmetric block cipher encrypts data
in 128-bit blocks.
key sizes of 128 bits, 192 bits, or 256 bits
Data Encryption Standard (DES)
Encrypts data in 64-bit blocks.
56-bit key
3DES (pronounced as “Triple DES”)
Symmetric block cipher. encrypts data in 64-bit blocks.
key sizes of 56 bits, 112 bits, or 168 bits
RC4 (Rivest Cipher)
Symmetric stream cipher
Blowfish and Twofish
Strong symmetric block cipher