Lesson 5 Flashcards
breaking and finding a weakness in a given algorithm
cryptanalysis
private key cryptography, utilizes a single key for encryption and decryption
symmetric cryptography
public key cryptography, utilizes public and private key
asymmetric cryptography
keyless cryptography that creates a unique and fixed length hash value based on the original message, integrity check
hash functions
allows users to sign a message in order to enable detection of changes to message contents
digital signatures
created to link a public key to a particular individual
certificate
symmetric key cryptography uses these ciphers (2)
block and stream
takes a predetermined number of bits and encrypts that block
block cipher
encrypts each bit in a plaintext message, 1 by 1
stream cipher
this cipher is more commonly used, slower but more efficient, resource intensive and complex
block cipher
block cipher using a 56-bit key, no longer considered secure
DES (symmetric)
uses DES to encrypt each block 3 times, operates in different modes (CBC, ECB, CFB, OFB, CTR)
3DES (symmetric)
uses 3 different ciphers with 128-bit key, 192-bit key, and 256-bit key, all having a block length of 128 bits
AES (symmetric)
used in SSL
RSA (asymmetric)
used in SHA-2, ECDSA
ECC (asymmetric)
used for encrypting messages and files, was originally symmetric
PGP (asymmetric)
SHA-2, SHA-3, MD5, RACE
hash algorithms
cryptography protects data in these states (2)
rest, motion