Use LEFT and RIGHT arrow keys to navigate between flashcards;
Use UP and DOWN arrow keys to flip the card;
H to show hint;
A reads text to speech;
31 Cards in this Set
- Front
- Back
Symetric Encryption |
Also called Secret Key Encryption - Strengths - Fast, Difficult to Break, Cheaper than Asymetric Weakness - Needs to be secured properly, Complex Key Management, Does Not Provide Authentication |
|
Asymetric Encryption |
Also called Public Key Encryption - Strengths - Separate keys public and private, Authentication and Non-Repudiation, Better scalability, slower |
|
Symetric Encryption Algorithyms |
DES - Data Encryption Standard - now considered to be insecure for many applications
3DES - Triple Data Encryption Standard AES - Advanced Encryption Standard
Larger the number of bits, stronger the encryption |
|
DES (Data Encryption Standard) |
64 bit block 56 bit key 8 parity bits ECB - Electronic Code Book CBC - Cipher Block Chaining Mode CF - Cipher Feedback Mode OF - Output Feedback Mode CM - Counter Mode
|
|
Encryption based on 128 bit Lucifer Algorithm |
DES (Data Encryption Standard) |
|
XOR (Exclusive OR) |
Compares 1's and 0's - Two of Same number (2 1's or 2 0's) = 0, Difference in numbers = 1. |
|
ECB (Electronic Code Book) |
ECB or electronic code book takes a message, divides it into blocks, and then each of the individual blocks are encrypted. |
|
Cipher Block Chaining Mode |
Cipher block chaining mode takes each block of plaintext and exclusive ORs it with the previous ciphertext block before it is encrypted. |
|
Cipher Feedback Mode |
Cipher feedback mode makes a block cipher into a self-synchronizing stream cipher. |
|
Output Feedback Mode |
Output feedback mode takes a block cipher and makes it into a synchronous stream cipher. Let's take a look at how it does this. It generates a key stream block or blocks, which are then exclusive ORed with the plaintext blocks. When this process is complete, you're left with the ciphertext. |
|
Counter Mode |
Counter mode takes a block cipher and turns it into a stream cipher. It generates the next key stream block by encrypting in order values of a specific counter. |
|
3DES (Triple Data Encryption Standard) |
Uses 3 56 bit keys - encrypts 3 times with 3 keys. Triple Data Encryption Standard is known to cause heavy performance issues and the transmission of the keys are deemed unsafe.
|
|
4 Modes of 3DES (Triple Data Encryption Standard) |
DES-EEE3 - 3 keys used DES-EDE3 - Plain txt encrypted 1 key - encryption process, then encrypted with 3rd key DES-EEE2 - 1st,2nd,then 1st, DES-EDE2 - 1st & 3rd key used |
|
3DES (Triple Data Encryption Standard) EEE3 Mode |
DES EEE3 uses three different keys for encryption. |
|
3DES (Triple Data Encryption Standard) EDE3 |
DES EDE3 – the plaintext is encrypted with one key, goes through a decryption process with key two, and then is encrypted with key three. |
|
3DES (Triple Data Encryption Standard) EEE2 |
DES EEE2 - Encryption occurs with the first key, and then it is encrypted with the second key, and then encrypts it with the first key once again. |
|
3DES (Triple Data Encryption Standard) EDE2 |
DES EDE2 - uses only two keys, and the first and third keys are used for the encryption process. The second key, which is only the different key between the three of them, is used in the middle process for the decryption. |
|
Encryption using 168 bit Key |
3DES (Triple Data Encryption Standard) Triple Data Encryption Standard is known to cause heavy performance issues and the transmission of the keys are deemed unsafe. |
|
AES (Advanced Encryption Standard) |
Symetric Block Cipher Based on Rjindael Algorithim Key length & Block Size - 128, 192, 256 bits 10-14 Computational Rounds 128 bits - 10 rounds, 192 bits - 12 rounds, 256 bits - 14 rounds |
|
AES (Advanced Encryption Standard) Stages |
Add Round Key SubBytes ShiftRows MixColumns |
|
AES (Advanced Encryption Standard) Advantages |
Can be implemented in wide range of processors, hardware, and environments Low Memory Requirements Defend against Timing Attacks 192 and 256 bits can provide high level of security |
|
AES (Advanced Encryption Standard) Disadvantages |
Low number of computational rounds |
|
Symetric Key Algorithms |
CCMP Rijndael CAST - 128 and 256 SAFER Blowfish - 64 bit block - key - 32 to 442 bits Twofish - 128 bit block - key 156 bits RC4 RC5 |
|
CCMP |
Counter Mode Cipher Block Chaining Message Authentication Code Protocol. It's definitely a mouthful, but remember, it's an encryption protocol for wireless LAN protocols. |
|
Encryption protocol for wireless LAN protocols. |
CCMP |
|
Rijndael |
Rijndael was designed to replace the Data Encryption Standard algorithm. Like DES, it is a block cipher. But, unlike DES, it can use 128, 192, and 256-bit keys. |
|
Designed to replace the Data Encryption Standard algorithm. |
Rijndael |
|
CAST |
CAST is another symmetric key block cipher. There is CAST 128, which has been preceded by CAST 256. |
|
SAFER |
SAFER stands for Secure And Fast Encryption Routine. |
|
Blowfish |
Blowfish uses a 64-bit block size and has a variable key length, anywhere from 32 bits through to 448 bits. |
|
Twofish |
Twofish uses a block size of 128 bits and key sizes up to 256 bits. |