Use of different algorithm types Flashcards
1
Q
Use of symmetric algorithms
A
- bulk encryption
- encrypting large amounts of data
2
Q
Use of asymmetric algorithms
A
- distribution of symmetric keys (shared key)
- identity authentication via digital signatures + certificates
- non-repudiation services + key agreement
3
Q
Use of hash functions
A
- verification of digital signatures
- generation of pseudo-random numbers
- integrity services (data integrity + authenticity)
4
Q
Hash / Symmetric / Asymmetric
- number of keys
A
Hash = 0 Symmetric = 1 Asymmetric = 2+
5
Q
Hash / Symmetric / Asymmetric
- recommended key length (NIST)
A
Hash = 256 bits Symmetric = 128 bits Asymmetric = 2048 bits
6
Q
Hash / Symmetric / Asymmetric
- common example
A
Hash = SHA Symmetric = AES Asymmetric = RSA
7
Q
Hash / Symmetric / Asymmetric
- Speed
A
Hash = Fast Symmetric = Fast Asymmetric = Slow
8
Q
Hash / Symmetric / Asymmetric
- complexity
A
Hash = medium Symmetric = medium Asymmetric = high
9
Q
Hash / Symmetric / Asymmetric
- Effect of Key compromise
A
Hash = n.a. Symmetric = Loss of both (sender & receiver) Asymmetric = Loss of owner of the asymmetric key only
10
Q
Hash / Symmetric / Asymmetric
- Key management & Sharing (easy or not?)
A
Hash = n.a. Symmetric = Challenging Asymmetric = Easy & Secure
11
Q
Hash / Symmetric / Asymmetric
- Examples
A
Hash = SHA-224, SHA-256, SHA-384, SHA-512 Symmetric = AES, Blowfish, Twofish, 3DES, RC4 Asymmetric = RSA, DSA, ECC, Diffie-Hellman