Domain 3. Sec Architecture and Engineering - Algorithms Flashcards
DES
Symmetric
64 bit cipher block size and 56 bit key
with 8 bits parity.
* 16 rounds of transposition and
substitution
(ECB, CBC, CFB, OFB, CTR)
AES
Symmetric Block cipher.
Use 3 different bit size keys 128, 192, 256
Examples Bitlocker, Microsoft EFS
Fast, secure 10,12, and 14
transformation rounds
3DES
Symmetric
DES x3, 56 bit keys not 64 bit
IDEA
Symmetric
128 bit key
64 bit cipher blocks
each block divide to 16 smaller
blocks
Each block undergo 8 rounds of
transformation
Example PGP
SkipJack
Symmetric
Uses Key Escrow
80 bit
64 bit cipher block
Blowfish
Symmetric
32 bit to 448 bit key
64 bit block cipher
TwoFish
Symmetric
128, 192, 256 bit key options
128 bit block
RC4
Symmetric Stream cipher
40-2048 key size.
Example SSL and WEP
* Stream cipher
* 256 Rounds of transformation
RC5
Symmetric Block cipher
2048 bit key
255 rounds transformation
* 32, 64 & 128 bit block sizes
CAST
Symmetric
Keys: CAST 128(40 to 128 bit)
CAST 256 (128 to 256 bit)
64 bit block 12 transformation rounds
128 bit block 48 rounds
transformation
Diffie-Hellman
Technically Asymmetric.
No confidentiality, authentication, or
non-repudiation
* Secure key transfer
RSA
Asymmetric
4096 bit key
- Public key and one-way function for
encryption and digital signature
verification - Private key and one-way function for
decryption and digital signature
generation - Used for encryption, key exchange and dig. signatures.
El-Gamal
Asymmetric
Used for encryption, key exchange
and digital signatures
* Slower
Elliptic Curve Cryptosystem
Used for encryption, key exchange
and digital signatures
* Speed and efficiency and better
security
MD5
Hash
It is one of the most popular hashing algorithms.MD5 produces a 128-bit digest. Messages are processed in 512-bit blocks, using four rounds of transformation. The resulting hash is typically represented as a 32-digit hexadecimal number. MD5 is susceptible to collision.