Quick Encryption Facts Flashcards

1
Q

AES encrypts data in blocks of what?

A

128bits

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Blowfish encryption key length range…

A

32bit to 448bit

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

AES and Two Fish have the same selection of encryption key lengths, what are they?

A

128bit, 192bit, 256bit

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Block sizes for Blowfish and Twofish Block Ciphers?

A

Blowfish 64-bit block

Twofish 128-bit block

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

RSA key size

A

2048bit

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

DES ,3DES and ____ are ____ ciphers that encrypt data in blocks of ____?

A

DES ,3DES and BLOWFISH are BLOCK ciphers that encrypt data in 64-BIT BLOCKS?

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

TwoFish key sizes

A

128bit
192bit
256bit

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Key size of DES

A

56bits

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

3DES key sizes

A

56bit
112bit
168bit

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Name the two 128bit block ciphers

A

AES

Twofish

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

List the block ciphers that have 3 different key lengths each…

A

AES
3DES
Twofish

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

List the 4 Cipher Block modes, starting with the most simplest first.

A

ECB (Electronic Code Book)
GCM - Galois/Counter Mode
CTM - Counter Mode
CBC - Cipher Block Chaining

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Cipher suites contain information on what cryptographic solutions?

A

Encryption
Authentication
Integrity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Complete the information
TLS uses ______ cryptography to exchange keys
TLS uses ______ for authentication
TLS uses ____ ____ ____ for integrity

A

TLS uses asymmetric cryptography to exchange keys
TLS uses certificates for authentication
TLS uses message authentication code (HMAC) for integrity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly