Encryption Solutions Flashcards

(9 cards)

1
Q

Block Cipher

A

A block cipher is a method of encrypting data in fixed-size chunks (called blocks) using a secret key.
Each block of plaintext (for example, 128 bits) is transformed into a block of ciphertext of the same size.

It works like a codebook: the same input block with the same key always produces the same encrypted output. Examples include AES and DES.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Stream Cipher

A

A stream cipher encrypts data one bit or byte at a time, using a continuously changing key stream.

It works like mixing your data with a random-looking stream of bits (often using XOR). This makes it fast and good for streaming data, such as video or voice. Examples include RC4 and ChaCha20.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Symmetric Encryption (Pre-Shared Key, PSK)

A

The same key handles the encryption/ decryption

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Asymmetric Encryption

A

Use a key pair to perform encryption/ decryption, one key encrypts, another decrypts

Encrypt Key = Public Key

Decrypt Key = Private Key

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Key Exchange

A

Symmetric Encryption schemes use Asymmetric Encryption to safely share the key used for Symmetric Encryption.

Asymmetric Encryption can simply send the public key over as plain text, since it has no value to an attacker.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Small Key Lengths

A

-Weaker
-Less CPU Intensive
-Faster

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Large Key Lengths

A

-Stronger
-More CPU Intensive
-Slower

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Hash Salting

A

Adding a random string to a value which is being hashed in order to randomize it further.

This protects against attackers using known hashes to break commonly used passwords.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Key Stretching

A

Running a file through multiple hashing algorithms in a row to further protect the original file

How well did you know this?
1
Not at all
2
3
4
5
Perfectly