• Shuffle
    Toggle On
    Toggle Off
  • Alphabetize
    Toggle On
    Toggle Off
  • Front First
    Toggle On
    Toggle Off
  • Both Sides
    Toggle On
    Toggle Off
  • Read
    Toggle On
    Toggle Off
Reading...
Front

Card Range To Study

through

image

Play button

image

Play button

image

Progress

1/34

Click to flip

Use LEFT and RIGHT arrow keys to navigate between flashcards;

Use UP and DOWN arrow keys to flip the card;

H to show hint;

A reads text to speech;

34 Cards in this Set

  • Front
  • Back
DES
Data Encryption Standard
AES
Advanced Encryption Standard
Advanced Encryption Standard
Replacement for DES. Utilizes 128, 192, and 256-bit encryption.
128-bit is the default.
Data Encryption Standard
A 56-bit encryption standard used from 1970 until its replacement by AES.
AES256
Advanced Encryption Standard running 256-bit encryption rather than the default 128-bit.
CAST
Fast data encryption using 40 to 128-bit encryption
RC
Rivet's Cipher
Rivet's Cipher
Strong encryption using up to 2048-bit encryption.
Blowfish / Twofish
64-bit encryption / 128-bit encryption
IDEA
Similar to DES but more secure. Uses 128-bit encryption. Utilized in PGP (Pretty Good Privacy).
Symmetric Encryption
Requires both users to hold the same key.
Asymmetric Encryption
Requires both a public and private key. Public key encrypts and private key decrypts.
Block Cipher
Encrypts chunks of data at once.
Stream Cipher
Encrypts individual bits/bytes of data.
PKC
Public Key Cryptography
4 main systems of Asymmetric Algorithms.
RSA, Diffie-Helman, ECC, El Gamal
RSA
Is used in SSL. Uses large integers as a foundation.
Diffie-Helman
Used to transmit keys security. This method breaks keys into multiple parts.
ECC
Elliptic Curve Cryptography.
Elliptic Curve Key
Used in cell phones and wireless hardware. This algorithm uses points on a curve to determine the necessary public/private combination.
El Gamal
Algorithm similar to D-H. DSA is based on El Gamal. Digital Signature Algorithm.
AES(128), AES(256), CAST, RC, Blowfish, Twofish, IDEA are examples of:
Symmetric Encryption
PKI
Public Key Infrastructure
Four (4) Key Components of PKI
Certificate Authority (CA), Registration Authority (RA), RSA, and Digital Certificats.
First step of sending an encrypted message. (PKI)
Obtain the user's public key.
CA
Certificate Authority
Certificate Authority
Organization responsible for issuing, revoking, and distributing certificates.
RA
Registration Authority
Registration Authority
A middle-man for the CA allowing for registration, key issuance, and validation. Does NOT issue certificates.
LRA
Local Registration Authority
Local Registration Authority
Similar to a registration authority but also verifies identity.
X.509
Most widely used certificate format.
What is the purpose of a certificate?
Binds the user's public key to their identity.
Certificate Policies
A CA can issue many different types of certificates an the CP determines how they are used.