• Shuffle
    Toggle On
    Toggle Off
  • Alphabetize
    Toggle On
    Toggle Off
  • Front First
    Toggle On
    Toggle Off
  • Both Sides
    Toggle On
    Toggle Off
  • Read
    Toggle On
    Toggle Off
Reading...
Front

Card Range To Study

through

image

Play button

image

Play button

image

Progress

1/39

Click to flip

Use LEFT and RIGHT arrow keys to navigate between flashcards;

Use UP and DOWN arrow keys to flip the card;

H to show hint;

A reads text to speech;

39 Cards in this Set

  • Front
  • Back

What is another name for symmetric encryption

Secret key


what is another word for asymmetric encryption

Public key


Symmetric encryption uses how many keys?

One

Asymmetric encryption uses how many keys?
two keys, one public one private

What are the strengths of symmetric encryption?
it is fasts, difficult to break, and cheaper that asymmetric encryption

What are the weaknesses of symmetric encryption?
Must be properly secured hence why key is so complex, does not provide authentication.

What are some of the strengths of asymmetric encryption?
Offers authentication, non-repudiation, and offers better scalability (ability to grow with the system), a more robust key management solution.

What are the weaknesses of asymmetric encryption?
It is slower.

What algorithms are included in Symmetric encryption?
DES- Data Encryption Standard
3DES- Triple Data Encryption Standard
AES- Advance Encryption Standard

The larger the number of bits......
the stronger the encryption

What are the features of DES
Very fast
Block cipher that is 64 bit blocks, with a key length of 56 bits
Key space is 2 to the power of 56

What are the weaknesses of DES?
insecure, no longer accepted for government standards
has a weak algorithm

What modes does DES operate in?
ECB- Electronic Code Book
Cipher Block Chaining Mode
Cipher Feedback
Output feedback

How does ECB work?
takes a message, divides it into blocks, and then each of he individual blocks are encrypted.

How does Cipher Block Chaining Mode work?
takes each block of plain text and exclusive ORs it with the previous cipher test block before it is encrypted

How does Cipher Feedback work?
makes a block of cipher into a self-synchronizing stream cipher

How does Output Feedback work?

takes a block of cipher and makes it into a synchronous stream cipher

What are the features of 3DES
-Uses three 56-bit keys, encrypts data three times with three keys
-Easy to implement on hardware and software
-Based on the trusted cipher which was the original Data Encryption Standard

What are the weaknesses of 3DES?
known to cause heavy performance issues
transmission of the keys are deemed unsafe

What modes does 3DES work in?
DES EEE3
DES EDE3
DES EEE2
DES EDE2

DES EEE3
uses three different keys for encryption

DES EDE3
plain text is encrypted with one key
goes through a decryption process with key two
then its encrypted with key three

DES EEE2
encrypted with one key
encrypted with the second key
encrypted with the first key again

DES EDE2
uses only two keys
the first and third keys are used for encryption, key two is used for decryption

What is AES?
Advanced Encryption Standard, a symmetric block cipher based on Rijndael algorithm.

What are the features of AES?
Key lengths can be 128, 192, or 256 bits
Block size can be 128, 192, 256 bits
10 to 14 computational rounds if both key and block size then: 10 for 128, 12 for 192, 14 for 256

What are the four stages of encryption for AES?
Add Round Key
Sub Bytes
Shift Rows
Mix Columns

Add Round Key
each byte of the state is combined with a block of the round key using the bitwise exclusive OR

Sub Bytes
is another linear substitution step where each byte us replaced with another according to a specific look-up table

Shift Rows
is a transposition step where the last three rows of the state are shifted in normal position a certain number of steps

Mix Columns
a mixing operation which operates on the columns of the state, combining the four bytes in each column

What are the advantages of AES?
-key lengths 192, or 256 can provide a high level of security
-Can be implemented in a wide range of processors, hardware, and enviornments
-low memory requirements
-can defend against timing attacks

What are the disadvantages of AES?
low number of computational rounds

CCMP (symmetric key algorithm)
Counter Mode Cipher Block Chaining Message Authentication Code Protocol
-an encryption protocol for wireless LAN protocols
-128, 192, and 256 bit keys

CAST (symmetric key algorithm)
block cipher

SAFER (symmetric key algorithm)
Secure and Fast Encryption Routine

Blowfish (symmetric key algorithm)
uses a 64-bit block size with variable key length anywhere from 32 bits through 448 bits

Twofish (symmetric key algorithm)
uses 128 block size and keys of up to 256 bits

RC4

most widely used software