Encryption Flashcards

1
Q

AES (Advanced Encryption Standard)

A

Symmetric
Type: 128-bit block
Key: 128, 192 or 256 bits
Notes: Fast (only requires one pass), efficient, strong

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

DES (Data Encryption Standard)

A

Symmetric
Type: 64-bit block
Key: 56 bits
Notes: Small key = vulnerable to brute-force attacks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

3DES (Triple DES)

A

Symmetric
Type: 64-bit block
Key: 56, 112, 168 bits
Notes: Encrypts in 3 passes of DES algorithm w/multiple keys

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

RC4

A

Symmetric
Type: Stream
Key: 40-2048 bits
Notes: Not recommended b/c NSA believed able to break

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Blowfish

A

Symmetric
Type: 64-bit block
Key: 32-448 bits
Notes: Considered strong and can be faster than AES

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Twofish

A

Symmetric
Type: 128-bit block
Key: 128, 192, 256 bits
Notes:

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

RSA

A

Asymmetric
Key size: recommended minimum of 2,048 bits
Notes: Uses static keys
Uses mathematical properties of prime numbers
Widely used

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

ECC (Elliptic curve cryptography)

A

Asymmetric
Notes: Doesn’t take as much processing power as other crypto methods so often used on low-power devices.
It uses mathematical equations to formulate an elliptical curve then graphs points on the curve to create keys.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

DH (Diffie-Hellman)

A

Key exchange algorithm used to privately share a symmetric key between two parties. Once the two parties know the symmetric key, they use symmetric encryption to encrypt the data.
Uses both static and ephemeral keys.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

DHE (Diffie-Hellman Ephemeral

A

Uses ephemeral keys, generating different keys for each session.
Sometimes known as EDH

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

ECDHE (Elliptic Curve Diffie-Hellman Ephemeral)

Elliptic Curve Diffie-Hellman (ECDH)

A

Uses ephemeral keys generated using ECC

Uses static keys generated using ECC

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

S/MIME (Secure/Multipurpose Internet Mail Extensions)

A

One of the most popular standards used to digitally sign and encrypt email.
Uses RSA for asymmetric encryption and AES for symmetric encryption

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

PGP/GPG (Pretty Good Privacy / GNU Privacy Guard)

A

Method used to secure email communication. It can encrypt, decrypt, and digitally sign email.
Each of the PGP versions uses the RSA algorithm and public and private keys for encryption and decryption.
Uses both asymmetric and symmetric encryption.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly