Hashes, Flashcards
RIPEMD
Hash
RACE Integrity Primitives Evaluation Message Digest
160 Bits
Hashing
Integrity
MD Hashes
MD2, MD4, MD5
128 Bits
SHA-1
Secure Hashing Algorithm 1
160 BIT
SHA-2
256 BITS
SHA-512
512 BITS
Symmetric
Encryption
Shared Key
DES
Symmetric
Digital Encryption Standard
AES
Symmetric
Advanced Encryption Standard
128-BIT
Blowfish
Symmetric
Asymmetric Encryption
public key encryption
Diffie-Hellman (D-H)
Asymmetric Encryption
used with SSH
RSA
Asymmetric
Rivest, Shamir, and Adleman
used with SSL & TLS
minimum 512 bits
DSA
Asymmetric
Digital Signature Algorthm
ECC
Asymmetric
Elliptic Curve Cryptography
Based on the math used to represent elliptical curves and is more CPU-efficient than RSA—smaller keys, but same security as RSA
◦
Often seen in use with embedded devices
Symmetric ciphers
tens to named after “objects”
Encrypt the datawith low latency • Do not handle key exchange • Are fast • AES, Blowfish, DES, 3DES
Asymmetric ciphers
tends to be names after Humans
• Protect the key exchange • Easy key management • Are slow • RSA, ECC, DH
Hashes
tend to have “hash” or “digest” in their names
• Handle integrity checking • Are one-way • Create a message digest • MD series, SHA