• Shuffle
    Toggle On
    Toggle Off
  • Alphabetize
    Toggle On
    Toggle Off
  • Front First
    Toggle On
    Toggle Off
  • Both Sides
    Toggle On
    Toggle Off
  • Read
    Toggle On
    Toggle Off
Reading...
Front

Card Range To Study

through

image

Play button

image

Play button

image

Progress

1/31

Click to flip

Use LEFT and RIGHT arrow keys to navigate between flashcards;

Use UP and DOWN arrow keys to flip the card;

H to show hint;

A reads text to speech;

31 Cards in this Set

  • Front
  • Back
modes of DES
ECB Electronic Code Book
CBC Cipher Block Chaining
CFB Cipher Feedback
OFB Output feedback
CTR Counter Mode
ECB details
Electronic Code Book
block mode - 64Bit
no IV
no error propagation
CBC details
Cipher Block Chaining
block mode - 64Bit
no IV
error propagation
CFB details
Cipher Feedback
stream mode (CBC, but 1 bit block)
IV
error propagation
OFB details
Output Feedback
stream mode
no error propagation
IV
CTR details
Counter Mode
stream mode
no error propagation
IV
DES
64 bit block size
56 bit key
16 rounds of encryption
3DES
2 or 3 keys, ie:
112 bits
168 bits
IDEA
international data encryption algorithm
block cipher
64 bit block size
128 bit key
AES
symmetric block cipher
128 bit / 128 bit - 10 rounds encryption
192 bit / 192 bit - 12 rounds encryption
256 bit / 256 bit - 14 rounds encryption
Rijndael has variable key, but set to 128 for AES
blowfish
symmetric block cipher
64 bit data
default 128 bit key
(32 - 448 possible)
twofish
symmetric block cipher
128 bit data
default 128 - 256 keys
MD5
128 bit hash
SHA1
160 bit hash
SHA2
SHA-224
SHA-256
SHA-384
SHA-512
HAVAL
hash algorithm
128, 160, 192, 224, 256 bits
using 3, 4, 5 rounds
digital signatures
provide integrity and authentication = nonrepudiation
provide NO confidentiality
RC4
Symmetric Stream
Rivest Cipher
40bit = WEP 64 (40 + 24 IV)
104bit = WEP 128 (104 + 24 IV)
RC5
Symmetric block
32,64,128 block
Key 0 -2048
Rounds - 0 - 255 (18 - 20 is good)
Diffie-Hellman
First asymmetric
Key exchange
Key agreement protocol
Discrete logarithms
Digital signatures should be used, eg. IKE
RSA
Asymmetric
Used for symmetric key exchange
Key up to 2048 bits
Common standard
Very secure
El Gamal
Asymmetric
digital signatures
key exchange
encryption
Elliptical Curve
y2 = x3 + ax + b
Fast
163-bit key used in ECC has similar cryptographic strength to a 1,024-bit key used in the RSA
Merkle-Hellman Knapsack
Symmetric
Fixed weights algorithm
cracked
HMAC
Hashed Message Authentication Code
Hash but with password added to original message
Immune to multi collision attack
MAC
Message Authentication code
Symmetric secret key
unconditionally secure
hash function-based
stream cipher-based
block cipher-based.
DSA
Digital Signature Algorithm
SHA-1 in conjunction with public key encryption to create a 160-bit hash
IPSec
Internet layer
AH - Authentication Header
ESP - Encapsulated secure payload
SA - security association
IKE - Internet key exchange
IPSec AH
adds integrity and authentication
protect replay attacks
IPSec ESP
Encapsulated secure payload
authenticity, integrity and confidentiality protection of packets
IPSec ISAKMP
Internet Security Association and Key Management Protocol - creates the Security Association