Encryption Flashcards
AES (Advanced Encryption Standard)
Symmetric
Type: 128-bit block
Key: 128, 192 or 256 bits
Notes: Fast (only requires one pass), efficient, strong
DES (Data Encryption Standard)
Symmetric
Type: 64-bit block
Key: 56 bits
Notes: Small key = vulnerable to brute-force attacks
3DES (Triple DES)
Symmetric
Type: 64-bit block
Key: 56, 112, 168 bits
Notes: Encrypts in 3 passes of DES algorithm w/multiple keys
RC4
Symmetric
Type: Stream
Key: 40-2048 bits
Notes: Not recommended b/c NSA believed able to break
Blowfish
Symmetric
Type: 64-bit block
Key: 32-448 bits
Notes: Considered strong and can be faster than AES
Twofish
Symmetric
Type: 128-bit block
Key: 128, 192, 256 bits
Notes:
RSA
Asymmetric
Key size: recommended minimum of 2,048 bits
Notes: Uses static keys
Uses mathematical properties of prime numbers
Widely used
ECC (Elliptic curve cryptography)
Asymmetric
Notes: Doesn’t take as much processing power as other crypto methods so often used on low-power devices.
It uses mathematical equations to formulate an elliptical curve then graphs points on the curve to create keys.
DH (Diffie-Hellman)
Key exchange algorithm used to privately share a symmetric key between two parties. Once the two parties know the symmetric key, they use symmetric encryption to encrypt the data.
Uses both static and ephemeral keys.
DHE (Diffie-Hellman Ephemeral
Uses ephemeral keys, generating different keys for each session.
Sometimes known as EDH
ECDHE (Elliptic Curve Diffie-Hellman Ephemeral)
Elliptic Curve Diffie-Hellman (ECDH)
Uses ephemeral keys generated using ECC
Uses static keys generated using ECC
S/MIME (Secure/Multipurpose Internet Mail Extensions)
One of the most popular standards used to digitally sign and encrypt email.
Uses RSA for asymmetric encryption and AES for symmetric encryption
PGP/GPG (Pretty Good Privacy / GNU Privacy Guard)
Method used to secure email communication. It can encrypt, decrypt, and digitally sign email.
Each of the PGP versions uses the RSA algorithm and public and private keys for encryption and decryption.
Uses both asymmetric and symmetric encryption.