Use LEFT and RIGHT arrow keys to navigate between flashcards;
Use UP and DOWN arrow keys to flip the card;
H to show hint;
A reads text to speech;
31 Cards in this Set
- Front
- Back
modes of DES
|
ECB Electronic Code Book
CBC Cipher Block Chaining CFB Cipher Feedback OFB Output feedback CTR Counter Mode |
|
ECB details
|
Electronic Code Book
block mode - 64Bit no IV no error propagation |
|
CBC details
|
Cipher Block Chaining
block mode - 64Bit no IV error propagation |
|
CFB details
|
Cipher Feedback
stream mode (CBC, but 1 bit block) IV error propagation |
|
OFB details
|
Output Feedback
stream mode no error propagation IV |
|
CTR details
|
Counter Mode
stream mode no error propagation IV |
|
DES
|
64 bit block size
56 bit key 16 rounds of encryption |
|
3DES
|
2 or 3 keys, ie:
112 bits 168 bits |
|
IDEA
|
international data encryption algorithm
block cipher 64 bit block size 128 bit key |
|
AES
|
symmetric block cipher
128 bit / 128 bit - 10 rounds encryption 192 bit / 192 bit - 12 rounds encryption 256 bit / 256 bit - 14 rounds encryption Rijndael has variable key, but set to 128 for AES |
|
blowfish
|
symmetric block cipher
64 bit data default 128 bit key (32 - 448 possible) |
|
twofish
|
symmetric block cipher
128 bit data default 128 - 256 keys |
|
MD5
|
128 bit hash
|
|
SHA1
|
160 bit hash
|
|
SHA2
|
SHA-224
SHA-256 SHA-384 SHA-512 |
|
HAVAL
|
hash algorithm
128, 160, 192, 224, 256 bits using 3, 4, 5 rounds |
|
digital signatures
|
provide integrity and authentication = nonrepudiation
provide NO confidentiality |
|
RC4
|
Symmetric Stream
Rivest Cipher 40bit = WEP 64 (40 + 24 IV) 104bit = WEP 128 (104 + 24 IV) |
|
RC5
|
Symmetric block
32,64,128 block Key 0 -2048 Rounds - 0 - 255 (18 - 20 is good) |
|
Diffie-Hellman
|
First asymmetric
Key exchange Key agreement protocol Discrete logarithms Digital signatures should be used, eg. IKE |
|
RSA
|
Asymmetric
Used for symmetric key exchange Key up to 2048 bits Common standard Very secure |
|
El Gamal
|
Asymmetric
digital signatures key exchange encryption |
|
Elliptical Curve
|
y2 = x3 + ax + b
Fast 163-bit key used in ECC has similar cryptographic strength to a 1,024-bit key used in the RSA |
|
Merkle-Hellman Knapsack
|
Symmetric
Fixed weights algorithm cracked |
|
HMAC
|
Hashed Message Authentication Code
Hash but with password added to original message Immune to multi collision attack |
|
MAC
|
Message Authentication code
Symmetric secret key unconditionally secure hash function-based stream cipher-based block cipher-based. |
|
DSA
|
Digital Signature Algorithm
SHA-1 in conjunction with public key encryption to create a 160-bit hash |
|
IPSec
|
Internet layer
AH - Authentication Header ESP - Encapsulated secure payload SA - security association IKE - Internet key exchange |
|
IPSec AH
|
adds integrity and authentication
protect replay attacks |
|
IPSec ESP
|
Encapsulated secure payload
authenticity, integrity and confidentiality protection of packets |
|
IPSec ISAKMP
|
Internet Security Association and Key Management Protocol - creates the Security Association
|