Cryptography Flashcards

1
Q

Name Symetric Encryption Algorythms

A
DES/3DES
IDEA
Blowfish
Skipjack
AES
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Name DES Cipher Block

A

64bit blocks
DES Uses 16 ORs in a series to generate the cypher text. or 16 Rounds of encryption

Des actually uses 56 bit key
2-DES is 112 bit key
3-DES = 168 bit key

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Name IDEA Cipher Block

A

International Data Encryption Algo

Uses 64bit blocks like DES, but starts with 128 bit key

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Name Blowfish Cipher Block

A

Blowfish uses 64bi blocks to encrypt outpust an 80 bit key

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Name AES cipher block

A

AES Advanced Encryption Standard or Rijndael. has variable key strengths
128-bit requires 10 rounds
192 bit requires 12 rounds
256 bit requires 14 rounds

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What Cipher does WEP use

A

RC4.

This uses a variable key length ranging from 8 to 2018 bits. 1 to 256 bytes.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Name Algorithm Block Sizeses

A

AES: Blocksize 128 and keysize 128, 192 and 256
Blowfish Blocksize 64 and keysize 32 - 448
DES Blocksize 64 and keysize 56
2DES Blocksize 64 and keysize 112
3DES Blocksize 64 and keysize 168
IDEA Blocksize 64 and keysize 128
RC2 Blocksize 64 and keysize 128
RC5 Blocksize 32, 64 of 128 and keysize 0-2048
Skipjack Blocksize 64 keysize 80
Twofish Blocksize 128 keysize is 1 - 256

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Diffie Helman Algorythm

A

A keyexchange algo to enable 2 users to excange or negotiate a secret symmetric key that will be uses subsequently for message encryption. Does not provide for message confidentiality but is extremely useful for applications such as public key infrastructure PKI.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is a key escrow

A

A security measure in which a cryptographic key is entrusted to a third party

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is GAK

A

Gornment accsess to keys

GAK means that software companies will give copies of all keys to the government.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What dies a hash function d?

A

Take a message and mix it with a hash. Gives a unique output. Generated by the sender and sent along with the message to validate the integrity and authenticity.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

A message digest is also called?

A
Hashes
Hash Value
Hash Total
Fingerprint
CRC
Checksum
Digital ID
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Name the Hashing Algorithms

A

1: SHA Secure Hashing Algorithm
SHA-160 = 160 bits using a 512 bit Block
SHA-224 = 224 bits using a 512 bit block
SHA-256 = 256 bits using a 512 bit block
SHA-384 = 384 bits using a 1024 bit block
SHA-512 = 512 bits using a 1024 bit block

  1. Message Digest (2|4|5) all produce 128 bit output
  2. HAVAL Hash of variable length (128, 160, 192, 224 & 256 bits)
  3. HMAC Hash Message Authentication Code
  4. RIPEMD - 160 - output is 160 bits, operates similar to md5
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Name the purposes of PKI

A

Publish public keys
Certify that a key is tied to an individual or entity
Provide verification of the validity of a public key

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is a CA

A

Certificate Authority

Perform activities that make PKI function. CA Signs certificates.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is a RA

A

Registration Authority

Assists the CA by verifying the users identity PRIOR to issuing a certificate. DOES NOT ISSUE Certificates but facilitates the CA to do so.

17
Q

What is Key Wrapping?

A

Is to protect session key’s by wrapping a encapsulation with a KEK (Key encryption key). Can be accomplished with asymmetric or symmetric ciphers.

18
Q

What is PGP

A

Pretty Good Privacy. A protocol to secure send emails.

19
Q

email security

A

S/MIME (Secure Multipurpose Internet Mail Exension) - Authentication and Confidentiality protection. X509 certificate is used for authentication.

PEM (Privacy Enhanced Mail). Authentication,Confidentiality, Integrity, Non-repudiation. Uses RSA, DES and X.509

DKIM (Domain Key Identification Mail). Assertion that an e-mail was sent by an organization.

PGP. Pretty Good Privacy. Asymetric key system includes algorithms like RSA and IDEA.