Cryptography Flashcards

1
Q

AES Type

A

Symmetric

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

AES Method

A

128-bit block cipher

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

AES Key Size

A

128, 192, 256 bits

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

3DES Type

A

Symmetric

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

3DES Method

A

64-bit block cipher

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

3DES Key size

A

56, 112, 168 bits

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Blowfish Type

A

Symmetric

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Blowfish Method

A

64-bit block cipher

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Blowfish Key Size

A

32-448 bits

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Twofish Type

A

Symmetric

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Twofish Method

A

128-bit block cipher

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Twofish Key Size

A

128, 192, 256 bits

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

RC4 Type

A

Symmetric

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

RC4 Method

A

Stream Cipher

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

RC4 Key Size

A

40-2048 bits

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

DES Type

A

Symmetric

17
Q

DES Method

A

64-bit block cipher

18
Q

DES Key Size

A

56 bits

19
Q

CSR

A

Certificate Signing Request.
Message sent from applicant to registration authority of the public key infrastructure to apply for a digital identity certificate. Includes a public key. CA embeds the public key in the certificate.

20
Q

EAP Authentication Protocol

A

Extensible Authentication Protocol.
Two systems create a secure encryption key, known as a pairwise master key (PMK). Systems then use this key to encrypt all data transmitted between the devices

21
Q

Key Stretching

A

Increase the strength of stored passwords with a salt. Also called key strengthening. Bcrypt and PBKDF2 are key stretching techniques.