Cryptographic Types Flashcards

(13 cards)

1
Q

Stream Cipher

A

Encrypts data bit by bit or byte by byte using a psuedo-random stream generated by a secret key

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Block Cipher

A

Symmetric encryption that encrypts data in fixed-size blocks, usually 64 or 128 bits, using a secret key

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

AES

A

Can operate as a block cipher or a stream cipher (this is unique to AES)
128, 192, or 256 bit key sizes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

DES

A

One of the earliest encryption standards, 56-bt key to encrypt 64-bit data blocks
Short key length makes it vulnerable to brute force

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

3DES

A

Applies the DES algorithm three times using three different keys, increasing the effective key length to 112 bits

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Blowfish and Twofish

A

Blowfish was known for speed and flexibility but prone to collision
Twofish is its successor, uses 128-bit blocks with key sizes up to 256 bits

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

ChaCha20

A

Developed as a secure replacement for RC4
Popular in scenarios where low latency and strong security are required

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

RSA

A

Asymmetric algorithm for both encryption and signatures
Relies on the difficulty of factoring large prime numbers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

DSA

A

Tailored solely for signing, focusing on proving that a message comes from a legitimate sender and has not been altered

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Diffie-Hellman

A

Allows two parties to establish a common symmetric key over an unsecured channel without exchanging that secure key

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

ECC

A

Advanced form of encryption that uses the unique mathematical properites of elliptic curves to provide high security with smaller key sizes
256-bit key in ECC provides comparable security to a 3072-bit RSA key

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

ECDSA

A

Uses elliptic curves to provide robust security without the heavy resource requirements of RSA or DSA

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

ECDH

A

Elliptic Curve Diffie-Hellman
Uses elliptic curves to facilitate secure key exchanges

How well did you know this?
1
Not at all
2
3
4
5
Perfectly