Use LEFT and RIGHT arrow keys to navigate between flashcards;
Use UP and DOWN arrow keys to flip the card;
H to show hint;
A reads text to speech;
39 Cards in this Set
- Front
- Back
What is another name for symmetric encryption |
Secret key
|
|
|
Public key
|
|
|
One
|
|
Asymmetric encryption uses how many keys? |
two keys, one public one private
|
|
What are the strengths of symmetric encryption? |
it is fasts, difficult to break, and cheaper that asymmetric encryption
|
|
What are the weaknesses of symmetric encryption? |
Must be properly secured hence why key is so complex, does not provide authentication.
|
|
What are some of the strengths of asymmetric encryption? |
Offers authentication, non-repudiation, and offers better scalability (ability to grow with the system), a more robust key management solution.
|
|
What are the weaknesses of asymmetric encryption? |
It is slower.
|
|
What algorithms are included in Symmetric encryption? |
DES- Data Encryption Standard
3DES- Triple Data Encryption Standard AES- Advance Encryption Standard |
|
The larger the number of bits...... |
the stronger the encryption
|
|
What are the features of DES |
Very fast
Block cipher that is 64 bit blocks, with a key length of 56 bits Key space is 2 to the power of 56 |
|
What are the weaknesses of DES? |
insecure, no longer accepted for government standards
has a weak algorithm |
|
What modes does DES operate in? |
ECB- Electronic Code Book
Cipher Block Chaining Mode Cipher Feedback Output feedback |
|
How does ECB work? |
takes a message, divides it into blocks, and then each of he individual blocks are encrypted.
|
|
How does Cipher Block Chaining Mode work? |
takes each block of plain text and exclusive ORs it with the previous cipher test block before it is encrypted
|
|
How does Cipher Feedback work? |
makes a block of cipher into a self-synchronizing stream cipher
|
|
How does Output Feedback work? |
takes a block of cipher and makes it into a synchronous stream cipher |
|
What are the features of 3DES |
-Uses three 56-bit keys, encrypts data three times with three keys
-Easy to implement on hardware and software -Based on the trusted cipher which was the original Data Encryption Standard |
|
What are the weaknesses of 3DES? |
known to cause heavy performance issues
transmission of the keys are deemed unsafe |
|
What modes does 3DES work in? |
DES EEE3
DES EDE3 DES EEE2 DES EDE2 |
|
DES EEE3 |
uses three different keys for encryption
|
|
DES EDE3 |
plain text is encrypted with one key
goes through a decryption process with key two then its encrypted with key three |
|
DES EEE2 |
encrypted with one key
encrypted with the second key encrypted with the first key again |
|
DES EDE2 |
uses only two keys
the first and third keys are used for encryption, key two is used for decryption |
|
What is AES? |
Advanced Encryption Standard, a symmetric block cipher based on Rijndael algorithm.
|
|
What are the features of AES? |
Key lengths can be 128, 192, or 256 bits
Block size can be 128, 192, 256 bits 10 to 14 computational rounds if both key and block size then: 10 for 128, 12 for 192, 14 for 256 |
|
What are the four stages of encryption for AES? |
Add Round Key
Sub Bytes Shift Rows Mix Columns |
|
Add Round Key |
each byte of the state is combined with a block of the round key using the bitwise exclusive OR
|
|
Sub Bytes |
is another linear substitution step where each byte us replaced with another according to a specific look-up table
|
|
Shift Rows |
is a transposition step where the last three rows of the state are shifted in normal position a certain number of steps
|
|
Mix Columns |
a mixing operation which operates on the columns of the state, combining the four bytes in each column
|
|
What are the advantages of AES? |
-key lengths 192, or 256 can provide a high level of security
-Can be implemented in a wide range of processors, hardware, and enviornments -low memory requirements -can defend against timing attacks |
|
What are the disadvantages of AES? |
low number of computational rounds
|
|
CCMP (symmetric key algorithm) |
Counter Mode Cipher Block Chaining Message Authentication Code Protocol
-an encryption protocol for wireless LAN protocols -128, 192, and 256 bit keys |
|
CAST (symmetric key algorithm) |
block cipher
|
|
SAFER (symmetric key algorithm) |
Secure and Fast Encryption Routine
|
|
Blowfish (symmetric key algorithm) |
uses a 64-bit block size with variable key length anywhere from 32 bits through 448 bits
|
|
Twofish (symmetric key algorithm) |
uses 128 block size and keys of up to 256 bits
|
|
RC4 |
most widely used software |