Encryption Algorithms Flashcards

1
Q

Data Encryption Standard (DES)

A

The Data Encryption Standard is a symmetric block cipher, meaning a cryptographic key and algorithm are applied to a block of data simultaneously rather than one bit at a time. To encrypt a plaintext message, DES groups it into 64-bit blocks. Too insecure for modern applications

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Triple DES

A

In cryptography, Triple DES, officially the Triple Data Encryption Algorithm, is a symmetric-key block cipher, which applies the DES cipher algorithm three times to each data block.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Andvanced Encryption Standard (AES)

A

The Advanced Encryption Standard (AES) is a symmetric block cipher chosen by the U.S. government to protect classified information.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Blowfish

A

Blowfish is a symmetric-key block cipher. Included in many cipher suites and encryption products. Blowfish provides a good encryption rate in software, and no effective cryptanalysis of it has been found to date.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Twofish

A

Twofish is the successor to Blowfish, and, like its predecessor, uses symmetric encryption, so only one 256-bit key is necessary. This technique is one of the fastest encryption algorithms and is ideal for both hardware and software environments.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Twofish

A

Twofish is the successor to Blowfish, and, like its predecessor, uses symmetric encryption, so only one 256-bit key is necessary. This technique is one of the fastest encryption algorithms and is ideal for both hardware and software environments.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Hashing

A

Hashing is the process of transforming any given key or a string of characters into another value. This is usually represented by a shorter, fixed-length value or key that represents and makes it easier to find or employ the original string. The most popular use for hashing is the implementation of hash tables.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly