1. How does CBC work?
2. Name a security flaw or issue.
3. What algorithm is it part of?
4. What does CBC stand for?
1. How does CFB work
2. Name security flaw(s),
3. What algorith is it part of?
4. What does CFB stand for?
1. How does OFB work?
2. Name security flaw(s) or advantages,
3. What algorith is it part of,?
4. What does OFB stand for?
1. How does CTR work
2. Name security flaw(s).
3. What algorith is it part of,?
4. What does CTR stand for?
1. Is BLOWFISH Symmetric or Assymetric?
2. What is the block size when encrypting?
3. How many bits is the key length?
4. What are its advantages?
192 bit key= 12 rounds of encryption
256 bit key= 14 rounds of encryption
In regards to SYMMETRIC KEY management, what are three methods to accomplish?
1. Offline distribution- Has to be physically provided
2. Public Key Encryption- Used to set up the initial communication link- then the parties switch to Private Key encryption which is faster.
3. Diffie-Hellman- use when there is no offline or public key encryption is available- random large integers selected and calculations performed- each party uses their integers to produce a result and exchange to verify they got the same results
What are the key lengths of:
RSA
DSA
Elliptic Curve
RSA= 1,024
DSA=1,024
Elliptic Curve=160 bits
In Publick Key Cryptography, Bob wants to send a message to Sue, what does
he use to encrypt the message and how does Sue Decrypt the message?
Bob uses Sue’s Public Key to encrypt the message. Sue uses her
Private Key to decrypt the message.
How long are the key lengths for:
1. RSA
2. DSA
3. Elliptic curve
1. What is Elliptic Curve?
2. What is the Eliiptic Curve equation?
3. How many keys in Elliptic Curve are equal to 1024 RSA?
Name the 4 versions of TRIPLE DES (3 DES) and the number of encryption (and or decryption) operations.