• Shuffle
    Toggle On
    Toggle Off
  • Alphabetize
    Toggle On
    Toggle Off
  • Front First
    Toggle On
    Toggle Off
  • Both Sides
    Toggle On
    Toggle Off
  • Read
    Toggle On
    Toggle Off
Reading...
Front

Card Range To Study

through

image

Play button

image

Play button

image

Progress

1/22

Click to flip

Use LEFT and RIGHT arrow keys to navigate between flashcards;

Use UP and DOWN arrow keys to flip the card;

H to show hint;

A reads text to speech;

22 Cards in this Set

  • Front
  • Back
There are four modes of this DES algorithm:
Electronic code book, Output feedback, Cipher feedback and cipher block chaining.
__________ encrypts messages with DES in CBC mode, provides key distribution of DES keys by encrypting them with RSA, and signs messages with RSA over MD2 or MD5.
Privacy Enhanced Mail
A bit indicating whether the sum of a previous series of bits is even or odd.
Parity bits
A _________ for a recipient is a combination of encrypted content data (of any kind) and the content encryption key in an encrypted form that has been prepared for the use of the recipient
Digital envelope
A certificate document in the form of a digital data object (a data object used by a computer) to which is appended a computed digital signature value that depends on the data object Although the recommended definition can be interpreted to include those items, the security community does not use the term with those meanings.
Digital certificate
is a symmetric encryption algorithm. It is based on block cipher of a variable length. It encrypts the message through integer additions, the application of a bitwise Exclusive OR (XOR), and variable rotations.
RC5
The term "open message format" is used for the message's that are encrypted using the sender's _______ key. If the message had been encrypted with receiver's public key, than only the person whom it was addressed to can read it.
private
The _________ encryption strength is dependent on the complexity of using discrete logarithms in a finite field.
El Gamal
_________ is a public key alogrithm. The security of this algorithm comes from the difficulty of factoring large numbers.
Ron Rivest, Adi Shamir, and Leonard Adleman (RSA)
___________ provides digital signature, secure key distribution, and encryption. It is more efficient compared to RSA due the rich mathematical structures
Elliptic Curve Cryptosystems (ECC)
DES Modes
ECB (_____________)
- ______ mode of DES
- ______ Cipher
- ______ secure of the modes
-creates _____
DES Modes
ECB Electronic code book
- native mode of DES
- Block Cipher
- Least secure of the modes
- creates patterns
DES Modes
CBC (______________)
-_______ Cipher
-______ bits plaintext blocks
- key is ______ for each block, does not create patterns.
DES Modes
CBC Cipher block chaining
-Block Cipher
-64 bits plaintext blocks
- key is changed for each 64-bit block, does not create patterns.
DES Modes
CFB (________)
-______ cipher
- Uses _____ cipher text to _____ key
- An error will corrupt _____ message after the error.
DES Modes
CFB (Cipher feedback mode)
-Stream cipher
- Uses previous cipher text to decrypt key
- An error will corrupt entire message after the error.
DES Modes
OFB (______)
-______ cipher
- ______ is used to generate the key
- An error will corrupt ______ message.
DES Modes
OFB (Output Feedback Mode)
-Stream cipher
- Feedback is used to generate the key
- An error will corrupt part of the message.
DES Modes
CTR (_______)

-64 bit ______ number
-____ counter for every block of text
- Used by ____ and _____
DES Modes
CTR (Counter Mode)

-64 bit random number
-Different counter for every block of text
- Used by ATM and IPSEC
Meet in the middle attack is a specific attack on ___________
Meet in the middle attack is a specific attack on double DES
AES (______)
___ , ____, _____, bit key lengths
Developed by ______
- _______ cipher
AES (Advanced Encryption Standard)
128 , 192, 256, bit key lengths
Developed by Rijndael
- block cipher
AES uses the following to calculate the algorithm:
- ______
- ______
- ______
- ______
AES uses the following to calculate the algorithm:
- Addroundkey (Xor)
- S-boxes (subbytes)
- Shiftrows
- mixcolumns
IDEA (________)
_____ bit blocks with _____ bit key
___ key length
IDEA (International Data Encryption Algorithm)
64 bit blocks with 128 bit key
fixed key length
Safer (________)
works in ______ and _____ bit
Safer (Secure and fast encryption routine)
works in 64 and 128 bit
RC5
___, ____, ______ block sizes

___ to _____ key length
RC5
32, 64, 128 block sizes

0 to 2048 key length
Asymmetric Key Symmetric Key
_____ bits 64 bits
_____ bits 112 bits
_____ bits 128 bits
Asymmetric Key Symmetric Key
512 bits 64 bits
1792 bits 112 bits
2304 bits 128 bits