Cryptography Flashcards

1
Q

RIPEMD

A

Hashing algorithm that is based on MD4, collisions were found so it now exists in versions of 160-bits, 256-bits, and 320-bits.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

SHA1

A

SHA (Secure Hash Algorithm): Hashing algorithm, one-way 160-bit hash value with encryption protocol. Standard hash algorithm today, went from SHA-1 (160-bit digest, deprecated) to SHA-2

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

NTLM

A

creates a 128-bit fixed output

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

MD-5

A

MD5 (Message-Digest Algorithm v5): Hashing algorithm, 128-bit hash with strong security, collision was found in 1996 so it is not used as much nowadays.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

AES

A

AES (Advanced Encryption Standard): Symmetric, block cipher with 128-bit blocks, key sizes of 128-bit, 192-bit and 256-bit.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

DES

A

DES (Data Encryption Standard): Symmetric, was common until replaced by AES, the block cipher is 64-bit and the key is 56-bit (very small), this means it can easily be brute forced.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

RC4

A

Symmetric, part of the original WEP standard with key sizes of 40-bit to 2048-bit. Deprecated from biased output.(predictable IV)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

RSA

A

RSA (Rivest, Shamir, Adleman): First practical use of public key cryptography, uses large prime numbers as the basis for encryption. Can generate key pairs used. In email encryption

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

DSA

A

DSA (Digital Signature Algorithm): Standard for digital signatures

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Twofish

A

Twofish: Symmetric, uses a very complex key structure up to 256-bits but still similar to predecessor, works using 128-bit blocks. Again, not limited by patents.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Blowfish

A

Blowfish: Symmetric, fast and has variable key-lengths from 1-bit to 448-bits, uses 64-bit block cipher. Not limited by patents.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

DHE

A

Diffie-Hellman: An asymmetric standard for exchanging keys. Primarily used to send private keys over public (unsecured) networks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

TPM

A

A Trusted Platform Module (TPM) is a hardware chip on a motherboard and provides a local secure boot process. A TPM includes an encryption key burned into the CPU, which provides a hardware root of trust. stores cryptographic keys used for encryption.
A TPM supports secure boot and attestation processes.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

HSM

A

Hardware security module. A removable or external device that can generate, store, and manage RSA keys used in asymmetric encryption.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Decryptor

A

Devices used to create separate SSL (or TLS) sessions. They allow other security devices to examine encrypted traffic sent to and from the Internet.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

SSL/TLS accelerator

A

Devices used to handle TLS traffic. Servers can off-load TLS traffic to improve performance.

17
Q

3DES

A

DES: Symmetric, very secure and upgrade over DES with three separate keys and three passes over data. Not used in modern day either.

18
Q

ECC

A

Elliptic curve cryptography (ECC): Asymmetric, uses smaller key sizes and curve algorithms to secure data, useful in portable devices because it uses less CPU power.

19
Q

PGP

A

Pretty Good Privacy (PGP) is a method used to secure email communication.communication. It can encrypt, decrypt, and digitally sign email.Just like S/MIME, PGP uses both asymmetric and symmetric encryption.

20
Q

GPG

A

GPG (GNU Privacy Guard): A free, open-source version of OpenPGP that provides equivalent encryption and authentication services.

21
Q

remote attestation

A

A remote attestation process works like the secure boot process. However, instead of checking the boot files against the report stored in the TPM, it uses a separate system. when the TPM is configured, it captures the signatures of key files, but sends this report to a remote system.

22
Q

S/MIME

A

Secure/Multipurpose Internet Mail Extensions(S/MIME) is one of the most popular standards used to digitally sign and encrypt email. Most email applications that support encryption and digital signatures use S/MIME standards.S/MIME uses RSA for asymmetric encryption and AES for symmetric encryption.

23
Q

ECB

A

The Electronic Codebook (ECB) mode of operation is the simplest cipher mode mentioned in this section. Algorithms that use ECB divide the plaintext into blocks and then encrypt each block using the same key.The Electronic Codebook (ECB) mode of operation is deprecated and should not be used.

24
Q

(CBC)

A

Counter Block Chain mode is used by some symmetric block ciphers. It uses an IV for randomization when encrypting the first block. It then combines each subsequent block with the previous block using an XOR operation. (less efficient than some other modes)

25
Q

(CTM/CTR/CM)

A

Counter mode effectively converts a block cipher into a stream cipher. It combines an IV with a counter and uses the result to encrypt eachplaintext block. Each block uses the same IV, but CTM combines it with the counter value, resulting in a different encryption key for each block.

26
Q

GCM

A

Galois/Counter Mode (GCM) is a mode of operation used by many block ciphers. It combines the Counter mode of operation with the Galois mode of authentication. Note thatit doesn’t authenticate users or systems, but instead provides data authenticity (integrity) and confidentiality.

27
Q

PGP/GPG

A

Pretty Good Privacy (PGP) is a method used to secure email communication. It can encrypt, decrypt, and digitally sign email.GNU Privacy Guard (GPG) is free software that is based on the OpenPGP standard.Each of the PGP versions uses the RSA algorithm and public and private keys for encryption and decryption. Just like S/MIME, PGP uses both asymmetric and symmetric encryption.

28
Q

SHA 2

A

SHA-2 improved SHA-1 to overcome potential weaknesses. It includes four versions. SHA-256 creates 256-bit hashes and SHA-512 creates 512-bit hashes. SHA-224 (224-bit hashes) and SHA-384 (384-bit hashes) create truncated versions of SHA-256 and SHA- 512, respectively.

29
Q

MD4

A

It implements a cryptographic hash function for use in message integrity checks. The digest length is 128 bits.