Stream Ciphers and Block Ciphers Flashcards

1
Q

Encryption is done one bit or byte at a time
– High speed, low hardware complexity
* Used with symmetric encryption
– Not commonly used with asymmetric encryption
* The starting state should never be the same twice
– Key is often combined with an initialization vector (IV)

A

Stream Ciphers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Encrypt fixed-length groups
– Often 64-bit or 128-bit blocks
– Pad added to short blocks
– Each block is encrypted or decrypted independently
* Symmetric encryption
– Similar to stream ciphers
* Block cipher modes of operation
– Avoid patterns in the encryption
– Many different modes to choose from

A

Block Ciphers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Encrypt one fixed-length group of bits at a time
– A block
* Mode of operation
– Defines the method of encryption
– May provide a method of authentication
* The block size is a fixed size
– Not all data matches the block size perfectly
– Split your plaintext into smaller blocks
– Some modes require padding before encrypting

A

Cipher Block Mode of Operation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Blank verifies integrity for data such as email, downloaded files, and files stored on a disk. A blank is a number created with a hashing algorithm.

A

Hash

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

A number derived from performing a calculation on data such as a message, patch, or file. This creates a fixed length stream of bits or hexadecimal characters, which cannot be reversed to recreate the original data.

A

Hash

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Is SHA 0 used?

A

No

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Blank are a group of hashing algorithms with variations in grouped four families-SHA-0, SHA-1, SHA-2, and SHA-3

A

Secure Hash Algorithms

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Blank is an updated version that creates 160-bit hashes. It is similar to the MD5 algorithm. Weaknesses were discovered and it is no longer approved for most cryptographic use cases

A

SHA-1

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Blank is improved SHA-1 to overcome potential weaknesses. It includes four versions. SHA-256 creates 256-bit hashes and SHA-512 creates 512-bit hashes. SHA -224(224 bit hashes) and SHA-384 (384 bit-hashes) created truncated versions of SHA-1 and SHA-512.

A

SHA-2

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Previously known as Keccak, blank is an alternative to SHA-2. It can create hashes the same size as SHA-2 (224 bits, 256 bits, and 512 bits)

A

SHA-3

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

A blank occurs when the hashing algorithm creates the same hash from different inputs. This is not desirable.

A

Collision

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Validates an identity

A

Authentication

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

prevents a party from denying an action

A

non-repudiation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

provides authentication, non-repudiation, and integrity

A

Digital signature

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

A hash of an email message encrypted with senders private key

A

Digital signature

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

encrypts data one bit at a time

A

stream ciphers

17
Q

Ciphers that encrypt data in blocks

A

Block ciphers

18
Q

A fixed length of string of bits similar to other hashing algorithms such as MD5 or SHA-256. This also uses a shared secret key to add some randomness to the result and only the sender and receiver know the key.

A

Hand-based Message Authentication Code (HMAC)

19
Q

A technique that increases the strength of stored passwords. Instead of adding salt to the password before hashing it, this technique applies a cryptographic stretching algorithm to the salted password

A

Key Stretching