• Shuffle
    Toggle On
    Toggle Off
  • Alphabetize
    Toggle On
    Toggle Off
  • Front First
    Toggle On
    Toggle Off
  • Both Sides
    Toggle On
    Toggle Off
  • Read
    Toggle On
    Toggle Off
Reading...
Front

Card Range To Study

through

image

Play button

image

Play button

image

Progress

1/14

Click to flip

Use LEFT and RIGHT arrow keys to navigate between flashcards;

Use UP and DOWN arrow keys to flip the card;

H to show hint;

A reads text to speech;

14 Cards in this Set

  • Front
  • Back

• Asymmetric encryption


• Uses mathematical equations of curves


• Very lightweight on resources

ECC (Elliptic Curve Cryptography)

• Asymmetric encryption


• Based off of Diffie-Hellman key exchange


• Used extensively for web site encryption/DRM


• 1,024-4,096 bit key sizes

RSA (Rivest-Shamir-Adelman)

• Asymmetric encryption


• Very simple encryption/decryption process


• Unbreakable when used correctly

One-Time Pad

• Symmetric encryption


• Not common due to logical predictability


• 40-2,048 bit key size



RC4 (Ron's Code 4)

• Symmetric encryption


• 64-bit block cipher with 56-bit key


• Not secure against modern technology

DES (Data Encryption Standard)

• Symmetric encryption


• Three 64-bit block cipher with 56-bit keys


• Can use 1, 2, or 3 different keys to encrypt


• Very taxing on hardware

3DES (Triple DES)

• Symmetric encryption


• US Federal Government Standard


• 128-bit block cipher


• Key can be 128-256 bits


• Used in WPA2

AES (Advanced Encryption Standard)

• Symmetric encryption


• 64-bit block cipher


• Key bit length can be 1-448 bits

Blowfish

• Symmetric encryption


• 128-bit block cipher


• Key sizes up to 256-bit

Twofish

• Hash function


• 128-bit hash value


• Not collision resistant

MD5 (Message Digest Algorithm)

*Replaced MD4

• Hash function


• 160-bit hash value


• Not collision resistant

SHA-1 (Secure Hash Algorithm-1)

• Hash Function


• Up to 512-bit hash value

SHA-2 (Secure Hash Algorithm-2)

• Hash function


• A family of message digest algorithms


• Found collision issues in 2004

RIPEMD (RACE Integrity Primitives Evaluation Message Digest)


*Was replaced with RIPEMD-160


*Based on MD4 but performs similar to SHA-1

• Combination of hash with secret key


• No asymmetric encryption required


• Used in network encryption protocols (IPSec and TLS)

HMAC (Hash-based Message Authentication Code)