Encryption 4.2 Flashcards
Primarily used for transmitting digital signatures and key exchange.
El Gamal
It’s a document that describes in detail the organizational structure, responsible roles, and rules for key management
KMPS(key management practices statement)
Similar functions to RSA but with smaller key sizes(requires less computing power)
ECC(Elliptic Curve Cryptosystem)
64-bit key/ 48 rounds of susitution and transposition using either 2 or 3 keys.
Consider to be deprecated.
3DES
128 or 192 or 256 bit key/ 10 or 12 or 14 rounds of susitution and transposition.
U.S Government symmetric algorithm standard.
AES|Rijndael
Key used in asymmetric encryption. It is shared openly and can be distributed to anyone.
Public key
Key used in asymmetric encryption. It is kept secret and should never be shared. Used to decrypt data that was encrypted.
Private key
Piece of information or a value used in an algorithm to encrypt and decrypt data
Key
Process of converting plain text into ciphertext using a mathematical algorithm and a key. The main function is to protect the confidentiality of data, ensuring only authorized parties with the correct decryption key can access the original information
Encryption
Stream cipher key sizes 40-2048 bits and has 4 variants.
RC4
Uses Key pairs, operates on relatively small data blocks, is computationally intensive, is scalable for large user bases, and facilitates secure key exchange.
Asymmetric
Uses a single shared key for both encryption and decryption, can operate large data blocks, is computationally efficient, is not scalable, and its key exchange is inherently insecure.
Symmetric
Widely implemented defacto commercial standard. Works with both encryption and digital signatures.
RSA
Primarily used for key agreement(key exchange). Allows two parties that have no prior knowledge of each other to jointly establish a shared secret key.
Diffie-Hellman
A symmetric key that’s used only once in a particular session.
Session Key