Encryption algorithm in which both the sender and receiver must know the same shared secret using a privately held key
Symmetric
Encryption algorithm where different keys are used to encrypt and decrypt the data
Asymmetric Algorithm
Utilizes asymmetric encryption to securely transfer a private key that can then be used with symmetric encryption
Hybrid Implementation
Utilizes a keystream generator to encrypt data bit by bit using a mathematical XOR function to create the ciphertext
Stream Cipher
Breaks the input into fixed-length blocks of data and performs the encryption on each block
Block Cipher
Encryption algorithm which breaks the input into 64-bit blocks and uses transposition and substitution to create ciphertext using an effective key strength of only 56-bits
Data Encryption Standard (DES)
Encryption algorithm which uses three separate symmetric keys to encrypt, decrypt, then encrypt the plaintext into ciphertext in order to increase the strength of DES
Triple DES
Symmetric block cipher, which uses 64-bit blocks to encrypt plaintext into ciphertext
International Data Encryption Algorithm (IDEA)
Symmetric block cipher that uses 128-bit, 192-bit, or 256-bit blocks and a matching encryption key size to encrypt plaintext into ciphertext
Advance Encryption Standard (AES)
provides the ability to use 128-bit blocks in its encryption algorithm and uses 128-bit, 192-bit. or 256-bit encryption keys
Twofish
Created by Ron Rivest, a cryptographer who’s created six algorithms under the name RC which stands for the Rivest Cipher
RC Cipher Suite
Symmetric streamcipher using a variable key size from 40-bits to 2048-bits that is used in SSL and WEP
Rivest Cipher (RC4)
Symmetric block cipher that uses key sizes up to 2048-bits
Rivest Cipher (RC5)
Symmetric block cipher that was introduced as a replacement for the DES but AES was chosen instead
Rivest Cipher (R6)
A hash digest of a message encrypted with the sender’s private key to let the recipient know the document created and sent by the person claiming to have sent it
Digital Signature
Used to conduct key exchanges and secure key distribution over an unsecure network
Diffie Hellman (DH)
Asymmetric algorithm that relies on the mathenmatical difficulty of factoring large prime numbers
RSA
Heavily used in mobile devices and it’s based on the algebraic structure of elliptical curves over finite fields to define its key
Elliptic Curve Cryptography
ECC version of the popular Diffie Hellman key exchange protocol
Elliptic Curve Diffie-Hellman (ECDH)
Uses two different keys: One for encryption and one for decryption
Asymmetric Encryption (Public Key Cryptography)