Encryption Flashcards
Explain Cipher Disk
Use two disks with letters, can be polyalphabetic or monoalphabetic.
Explain Blowfish
Symmetric block cipher
32 to 448-bit keys
64-bit blocks
Explain OFB
Output Feedback
Uses previous ciphertext for feedback as the subkey that is XORed with plaintext
Error in the beginning do not continue throughout the encryption process
Explain IDEA
International Data Encryption Algorithm
Symmetric block Cipher, designed to replace DES
128-bit key, 64-bit block
patented
Explain El Gamal
Asymmetric using Discrete Logarithm, like Diffie-Hellman
Explain Running-Key Cipher
adds letters of a text to letters of the message to get the cipher text. If the result is more than 26, uses modular math.
Explain One-Time Pad
Unbreakable, share secret pad, don’t reuse.
Explain ECB
Electronic Code Book, weakest form of DES.
No initialization vector or chaining.
Explain CTR
Counter mode
Uses a counter
Can be done in parallel
Explain Vigenere Cipher
Polyalphabetic, French, 16th Century.
Vigenere Square formed by 26 letters across the top, and down the left axis.
Random key is repeated, using the letter of the key with the letter of the plain text to find the cipher letter in the middle of the matrix
Explain Enigma, SIGABA, and Purple
Enigma was used by Germany in WW2
SIGABA was used by the US in WW2
Purple was used by Japan in WW2
Explain CBC
Cipher Block Chaining
block mode using XOR
uses initialization vector and chaining
Explain RSA
Asymmetric using Prime Number Factoring
Public and Private keys
Explain Wassenaar Arrangement
Restricted export of encryption technology to Terrorist countries.
Explain RC6
Symmetric block cipher
128, 196, 256-bit keys
128-bit block