4.2 - Encryption Flashcards

(14 cards)

1
Q

What is encryption?

A

Commonly used to protect the confidentiality of data in transit and at rest

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is Symmetric encryption and the process?

A

Uses the same key to encrypt and decrypt

Also known as single key, secret key, session key, encryption

Process
Cleartext -> symmetric algorithm + symmetric key -> ciphertext -> symmetric algorithm + symmetric key -> Cleartext

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is DES (symmetric algorithm)?

A

Block cipher
64 bit key/16 rounds of substitution and transposition
- Established in 1997
Can be broken in less than 56 hours

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is 3DES (symmetric algorithm)?

A

Block cipher
64 bit key 48 rounds of substitution, transposition using 2/3 keys

  • 1999 became US gov standard
  • Considered deprecated (outdated/weak)
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is AES/Rijndael (symmetric algorithm)?

A

Block cipher

128/192/256 bit key
10/12/14 rounds of substitution and transposition

  • 2002 replaces 3DES as US gov standard
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is RC4 (symmetric algorithm)?

A

Stream cipher

key sizes 10-2048
- 4 variants:
SPRITZ
RC4A
VMPC
RC4A+

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What are the characteristics of symmetric encryption?

A

Processing - computationally efficient

Key size - generally 128, 192, 256 bits

Scalability - not scalable -> need to create new keys for every individual

Key exchange - inherently insecure

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is Asymmetric encryption?

A

Uses two mathematically related keys to encrypt and decrypt. Public and private keys. Public key is freely distributed. Private key must be secured only used by owner

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is RAS (Asymmetric algorithm)?

A

Widely implemented de facto commercial standard

Works with encryption and digital signatures

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is Elliptic curve cryptosystem - ECC (Asymmetric algorithm)?

A

Similar to RSA but smaller key sizes (requires less computing power)

Current US Gove standard

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is Diffie-Hellman (Asymmetric algorithm)?

A

Used for key agreement (key exchange)

Allows two parties in the same DH group that have no prior knowledge of each other jointly establish a shared secrect key

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is EL Gamal (Asymmetric algorithm)?

A

Primarily used for transmitting digital signatures and key exchanged

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What are asymmetric encryption characteristics?

A

Processing - Computationally intensive

Key size - generally 2048 or greater

Scalability - is scalable

Key exchange - designed for key exchange

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is key management practives statement (KMPS)?

A

A document that describes in detail the organisational structure, the responsible roles and the rules for key management

How well did you know this?
1
Not at all
2
3
4
5
Perfectly