Stream Ciphers and Block Ciphers Flashcards
Encryption is done one bit or byte at a time
– High speed, low hardware complexity
* Used with symmetric encryption
– Not commonly used with asymmetric encryption
* The starting state should never be the same twice
– Key is often combined with an initialization vector (IV)
Stream Ciphers
Encrypt fixed-length groups
– Often 64-bit or 128-bit blocks
– Pad added to short blocks
– Each block is encrypted or decrypted independently
* Symmetric encryption
– Similar to stream ciphers
* Block cipher modes of operation
– Avoid patterns in the encryption
– Many different modes to choose from
Block Ciphers
Encrypt one fixed-length group of bits at a time
– A block
* Mode of operation
– Defines the method of encryption
– May provide a method of authentication
* The block size is a fixed size
– Not all data matches the block size perfectly
– Split your plaintext into smaller blocks
– Some modes require padding before encrypting
Cipher Block Mode of Operation
Blank verifies integrity for data such as email, downloaded files, and files stored on a disk. A blank is a number created with a hashing algorithm.
Hash
A number derived from performing a calculation on data such as a message, patch, or file. This creates a fixed length stream of bits or hexadecimal characters, which cannot be reversed to recreate the original data.
Hash
Is SHA 0 used?
No
Blank are a group of hashing algorithms with variations in grouped four families-SHA-0, SHA-1, SHA-2, and SHA-3
Secure Hash Algorithms
Blank is an updated version that creates 160-bit hashes. It is similar to the MD5 algorithm. Weaknesses were discovered and it is no longer approved for most cryptographic use cases
SHA-1
Blank is improved SHA-1 to overcome potential weaknesses. It includes four versions. SHA-256 creates 256-bit hashes and SHA-512 creates 512-bit hashes. SHA -224(224 bit hashes) and SHA-384 (384 bit-hashes) created truncated versions of SHA-1 and SHA-512.
SHA-2
Previously known as Keccak, blank is an alternative to SHA-2. It can create hashes the same size as SHA-2 (224 bits, 256 bits, and 512 bits)
SHA-3
A blank occurs when the hashing algorithm creates the same hash from different inputs. This is not desirable.
Collision
Validates an identity
Authentication
prevents a party from denying an action
non-repudiation
provides authentication, non-repudiation, and integrity
Digital signature
A hash of an email message encrypted with senders private key
Digital signature