Hashes, Flashcards

1
Q

RIPEMD

A

Hash
RACE Integrity Primitives Evaluation Message Digest
160 Bits

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Hashing

A

Integrity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

MD Hashes

A

MD2, MD4, MD5

128 Bits

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

SHA-1

A

Secure Hashing Algorithm 1

160 BIT

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

SHA-2

A

256 BITS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

SHA-512

A

512 BITS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Symmetric

A

Encryption

Shared Key

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

DES

A

Symmetric

Digital Encryption Standard

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

AES

A

Symmetric
Advanced Encryption Standard
128-BIT

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Blowfish

A

Symmetric

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Asymmetric Encryption

A

public key encryption

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Diffie-Hellman (D-H)

A

Asymmetric Encryption

used with SSH

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

RSA

A

Asymmetric
Rivest, Shamir, and Adleman
used with SSL & TLS
minimum 512 bits

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

DSA

A

Asymmetric

Digital Signature Algorthm

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

ECC

A

Asymmetric
Elliptic Curve Cryptography

Based on the math used to represent elliptical curves and is more CPU-efficient than RSA—smaller keys, but same security as RSA

Often seen in use with embedded devices

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Symmetric ciphers

tens to named after “objects”

A
Encrypt the datawith low latency
•
Do not handle key exchange
•
Are fast
•
AES, Blowfish, DES, 3DES
17
Q

Asymmetric ciphers

tends to be names after Humans

A
•
Protect the key exchange
•
Easy key management
•
Are slow
•
RSA, ECC, DH
18
Q

Hashes

tend to have “hash” or “digest” in their names

A
•
Handle integrity checking
•
Are one-way
•
Create a message digest
•
MD series, SHA