Encryption Flashcards
El gamal
Primarily used for transmitting digital signatures and key exchange
KPMS - key management practices standard
Is a document that describes in detail the organizational structure, responsible roles and rules for key management
ECC - elliptic curve crypto system
Similar function to RSA but with smaller key sizes (less computing power) current US government standard
AES - advanced encryption standard
128/192/256 bit key 10/12/14 rounds of substitution and transposition, replaced in 3DES standard
3DES- triple data encryption standard
64 bit/48 rounds substitution and transposition using either 2 or 3 keys - replaced by DES considered to be depreciated
3DES- triple data encryption standard
64 bit/48 rounds substitution and transposition using either 2 or 3 keys - replaced by DES considered to be depreciated
Key
This is mathematical signature used for encryption data process, asymmetric had 2 keys, symmetric 1 key
Private key
Key mathematically related to a public key asymmetric encryption, hold by receiver, top secret
Encryption
Is commonly used to protect the confidentiality of data transit and data rest. Process
Clear text=> algorithm key => cipher text => algorithm + key=>clear text
Rc4- rivest cipher 4
Stream cipher key 40-2048 bits. It encrypts messages one byte by one at a time via an algorithm. The most popular. 4 variants:
1. Spritz
2. RC4a
3. Vmcp
4. RC4a+
Asymmetric algorithm
Encryption uses 2 mathematically related keys to encrypt and decrypt keys are referred to as public and private key. Public key is freely distributed.private secured keys are top secret, handled by owner.
Is computer resources intensive, key 2048 or more, scalable, designed for key exchange,
Process:
Clear text=> asymmetric. Alg. + asymmetric key |M1 Key|=> cypher text =>|M2 key| symm. Alg, +asym key=> clear text
RSA
Widely implemented de facto commercial standard.works with encryption and digital signatures. Encrypts communication between two parties over an insecure network like the internet.is used with Transport layer security (TLS) to establish secure connections between web servers and web browsers, moreover RSA aids secure email communication by providing a way to encrypt and decrypt messages.
Pubic key
Key mathematically connected to person private key holder, is publish and used in asymmetric encryption
Symmetric encryption
Uses the ONE KEY, the same key is used to encrypt and decrypt data. The key may be referred to as a single key,shared key, secret key or session key. Is computionally efficient, key 128/192/256 bits, not scalable, inherently insecure
Process
Clear text=> symmetric key+ algorithm => ciphertext=> symmetric algorithm + symmetric key=> clear text
DIFFE - HELLMAN
Primary used for key agreement (key exchange) allows 2 parties to (in the same DH group) that have no prior knowledge of each other to jointly establish a shared secret key