Cryptographic Solutions Flashcards

(20 cards)

1
Q

Encryption algorithm in which both the sender and receiver must know the same shared secret using a privately held key

A

Symmetric

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Encryption algorithm where different keys are used to encrypt and decrypt the data

A

Asymmetric Algorithm

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Utilizes asymmetric encryption to securely transfer a private key that can then be used with symmetric encryption

A

Hybrid Implementation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Utilizes a keystream generator to encrypt data bit by bit using a mathematical XOR function to create the ciphertext

A

Stream Cipher

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Breaks the input into fixed-length blocks of data and performs the encryption on each block

A

Block Cipher

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Encryption algorithm which breaks the input into 64-bit blocks and uses transposition and substitution to create ciphertext using an effective key strength of only 56-bits

A

Data Encryption Standard (DES)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Encryption algorithm which uses three separate symmetric keys to encrypt, decrypt, then encrypt the plaintext into ciphertext in order to increase the strength of DES

A

Triple DES

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Symmetric block cipher, which uses 64-bit blocks to encrypt plaintext into ciphertext

A

International Data Encryption Algorithm (IDEA)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Symmetric block cipher that uses 128-bit, 192-bit, or 256-bit blocks and a matching encryption key size to encrypt plaintext into ciphertext

A

Advance Encryption Standard (AES)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

provides the ability to use 128-bit blocks in its encryption algorithm and uses 128-bit, 192-bit. or 256-bit encryption keys

A

Twofish

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Created by Ron Rivest, a cryptographer who’s created six algorithms under the name RC which stands for the Rivest Cipher

A

RC Cipher Suite

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Symmetric streamcipher using a variable key size from 40-bits to 2048-bits that is used in SSL and WEP

A

Rivest Cipher (RC4)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Symmetric block cipher that uses key sizes up to 2048-bits

A

Rivest Cipher (RC5)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Symmetric block cipher that was introduced as a replacement for the DES but AES was chosen instead

A

Rivest Cipher (R6)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

A hash digest of a message encrypted with the sender’s private key to let the recipient know the document created and sent by the person claiming to have sent it

A

Digital Signature

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Used to conduct key exchanges and secure key distribution over an unsecure network

A

Diffie Hellman (DH)

17
Q

Asymmetric algorithm that relies on the mathenmatical difficulty of factoring large prime numbers

18
Q

Heavily used in mobile devices and it’s based on the algebraic structure of elliptical curves over finite fields to define its key

A

Elliptic Curve Cryptography

19
Q

ECC version of the popular Diffie Hellman key exchange protocol

A

Elliptic Curve Diffie-Hellman (ECDH)

20
Q

Uses two different keys: One for encryption and one for decryption

A

Asymmetric Encryption (Public Key Cryptography)