Encryption Flashcards
Explain Cipher Disk
Use two disks with letters, can be polyalphabetic or monoalphabetic.
Explain Blowfish
Symmetric block cipher
32 to 448-bit keys
64-bit blocks
Explain OFB
Output Feedback
Uses previous ciphertext for feedback as the subkey that is XORed with plaintext
Error in the beginning do not continue throughout the encryption process
Explain IDEA
International Data Encryption Algorithm
Symmetric block Cipher, designed to replace DES
128-bit key, 64-bit block
patented
Explain El Gamal
Asymmetric using Discrete Logarithm, like Diffie-Hellman
Explain Running-Key Cipher
adds letters of a text to letters of the message to get the cipher text. If the result is more than 26, uses modular math.
Explain One-Time Pad
Unbreakable, share secret pad, don’t reuse.
Explain ECB
Electronic Code Book, weakest form of DES.
No initialization vector or chaining.
Explain CTR
Counter mode
Uses a counter
Can be done in parallel
Explain Vigenere Cipher
Polyalphabetic, French, 16th Century.
Vigenere Square formed by 26 letters across the top, and down the left axis.
Random key is repeated, using the letter of the key with the letter of the plain text to find the cipher letter in the middle of the matrix
Explain Enigma, SIGABA, and Purple
Enigma was used by Germany in WW2
SIGABA was used by the US in WW2
Purple was used by Japan in WW2
Explain CBC
Cipher Block Chaining
block mode using XOR
uses initialization vector and chaining
Explain RSA
Asymmetric using Prime Number Factoring
Public and Private keys
Explain Wassenaar Arrangement
Restricted export of encryption technology to Terrorist countries.
Explain RC6
Symmetric block cipher
128, 196, 256-bit keys
128-bit block
Explain COCOM
Restricted export of encryption technology to from COCOM members (US and allies), to non-COCOM members (Russia and others during the cold war), was restricted
Explain RC5
Symmetric block cipher
0 to 2040-bit keys
64 or 128-bit blocks
Explain the Ceaser Cipher
Monoalphabetic rotation cipher-shifting letters.
The amount shifted is the key.
Susceptible to frequency analysis.
Explain Single DES
64-bit blocks with 56-bit key, using 16 rounds
Explain CFB
Cipher Feedback
stream mode, uses initialization vector and feedback
What are the five modes of DES
Electronic Code Book (ECB) Cipher Block Chaining (CBC) Cipher Feedback (CFB) Output Feedback (OFB) Counter Mode (CTR)
Explain Diffie-Hellman
Asymmetric using Discrete Logarithm
Key exchange Protocol
Explain ECC
Elliptic Curve Cryptography
Asymmetric using discrete logarithm as applied to elliptic curves.
Strongest asymmetric encryption
used in low power devices.
Explain Triple DES
Applies Single DES three times per block
Uses encrypt/decrypt/encrypt
Uses 1, 2 or 3 keys
Explain AES
Advanced Encryption Standard Symmetric block cipher, 128-bit key with 10 rounds 192-bit key with 12 rounds 256-bit key with 14 rounds 128-bit block Uses four functions: SubBytes, ShiftRows, MixColumns, and AddRoundKey Formally known as Rijndeal
Explain Scytale
Sparta, Rod
Used by Sparta by using a rod.
Explain Twofish
Symmetric block cipher
128-256-bit keys
128-bit block