Use of different algorithm types Flashcards

1
Q

Use of symmetric algorithms

A
  • bulk encryption

- encrypting large amounts of data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Use of asymmetric algorithms

A
  • distribution of symmetric keys (shared key)
  • identity authentication via digital signatures + certificates
  • non-repudiation services + key agreement
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Use of hash functions

A
  • verification of digital signatures
  • generation of pseudo-random numbers
  • integrity services (data integrity + authenticity)
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Hash / Symmetric / Asymmetric

  • number of keys
A
Hash = 0
Symmetric = 1
Asymmetric = 2+
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Hash / Symmetric / Asymmetric

  • recommended key length (NIST)
A
Hash = 256 bits
Symmetric = 128 bits
Asymmetric = 2048 bits
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Hash / Symmetric / Asymmetric

  • common example
A
Hash = SHA
Symmetric = AES
Asymmetric = RSA
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Hash / Symmetric / Asymmetric

  • Speed
A
Hash = Fast
Symmetric = Fast
Asymmetric = Slow
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Hash / Symmetric / Asymmetric

  • complexity
A
Hash = medium
Symmetric = medium
Asymmetric = high
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Hash / Symmetric / Asymmetric

  • Effect of Key compromise
A
Hash = n.a.
Symmetric = Loss of both (sender & receiver)
Asymmetric = Loss of owner of the asymmetric key only
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Hash / Symmetric / Asymmetric

  • Key management & Sharing (easy or not?)
A
Hash = n.a.
Symmetric = Challenging
Asymmetric = Easy & Secure
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Hash / Symmetric / Asymmetric

  • Examples
A
Hash = SHA-224, SHA-256, SHA-384, SHA-512
Symmetric = AES, Blowfish, Twofish, 3DES, RC4
Asymmetric = RSA, DSA, ECC, Diffie-Hellman
How well did you know this?
1
Not at all
2
3
4
5
Perfectly