Encryption Flashcards

1
Q

Explain Cipher Disk

A

Use two disks with letters, can be polyalphabetic or monoalphabetic.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Explain Blowfish

A

Symmetric block cipher
32 to 448-bit keys
64-bit blocks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Explain OFB

A

Output Feedback
Uses previous ciphertext for feedback as the subkey that is XORed with plaintext
Error in the beginning do not continue throughout the encryption process

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Explain IDEA

A

International Data Encryption Algorithm
Symmetric block Cipher, designed to replace DES
128-bit key, 64-bit block
patented

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Explain El Gamal

A

Asymmetric using Discrete Logarithm, like Diffie-Hellman

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Explain Running-Key Cipher

A

adds letters of a text to letters of the message to get the cipher text. If the result is more than 26, uses modular math.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Explain One-Time Pad

A

Unbreakable, share secret pad, don’t reuse.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Explain ECB

A

Electronic Code Book, weakest form of DES.

No initialization vector or chaining.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Explain CTR

A

Counter mode
Uses a counter
Can be done in parallel

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Explain Vigenere Cipher

A

Polyalphabetic, French, 16th Century.
Vigenere Square formed by 26 letters across the top, and down the left axis.
Random key is repeated, using the letter of the key with the letter of the plain text to find the cipher letter in the middle of the matrix

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Explain Enigma, SIGABA, and Purple

A

Enigma was used by Germany in WW2
SIGABA was used by the US in WW2
Purple was used by Japan in WW2

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Explain CBC

A

Cipher Block Chaining
block mode using XOR
uses initialization vector and chaining

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Explain RSA

A

Asymmetric using Prime Number Factoring

Public and Private keys

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Explain Wassenaar Arrangement

A

Restricted export of encryption technology to Terrorist countries.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Explain RC6

A

Symmetric block cipher
128, 196, 256-bit keys
128-bit block

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Explain COCOM

A

Restricted export of encryption technology to from COCOM members (US and allies), to non-COCOM members (Russia and others during the cold war), was restricted

17
Q

Explain RC5

A

Symmetric block cipher
0 to 2040-bit keys
64 or 128-bit blocks

18
Q

Explain the Ceaser Cipher

A

Monoalphabetic rotation cipher-shifting letters.
The amount shifted is the key.
Susceptible to frequency analysis.

19
Q

Explain Single DES

A

64-bit blocks with 56-bit key, using 16 rounds

20
Q

Explain CFB

A

Cipher Feedback

stream mode, uses initialization vector and feedback

21
Q

What are the five modes of DES

A
Electronic Code Book (ECB)
Cipher Block Chaining (CBC)
Cipher Feedback (CFB)
Output Feedback (OFB)
Counter Mode (CTR)
22
Q

Explain Diffie-Hellman

A

Asymmetric using Discrete Logarithm

Key exchange Protocol

23
Q

Explain ECC

A

Elliptic Curve Cryptography
Asymmetric using discrete logarithm as applied to elliptic curves.
Strongest asymmetric encryption
used in low power devices.

24
Q

Explain Triple DES

A

Applies Single DES three times per block
Uses encrypt/decrypt/encrypt
Uses 1, 2 or 3 keys

25
Q

Explain AES

A
Advanced Encryption Standard
Symmetric block cipher,
128-bit key with 10 rounds
192-bit key with 12 rounds
256-bit key with 14 rounds
128-bit block
Uses four functions: SubBytes, ShiftRows, MixColumns, and AddRoundKey
Formally known as Rijndeal
26
Q

Explain Scytale

A

Sparta, Rod

Used by Sparta by using a rod.

27
Q

Explain Twofish

A

Symmetric block cipher
128-256-bit keys
128-bit block