Use LEFT and RIGHT arrow keys to navigate between flashcards;
Use UP and DOWN arrow keys to flip the card;
H to show hint;
A reads text to speech;
34 Cards in this Set
- Front
- Back
DES
|
Data Encryption Standard
|
|
AES
|
Advanced Encryption Standard
|
|
Advanced Encryption Standard
|
Replacement for DES. Utilizes 128, 192, and 256-bit encryption.
128-bit is the default. |
|
Data Encryption Standard
|
A 56-bit encryption standard used from 1970 until its replacement by AES.
|
|
AES256
|
Advanced Encryption Standard running 256-bit encryption rather than the default 128-bit.
|
|
CAST
|
Fast data encryption using 40 to 128-bit encryption
|
|
RC
|
Rivet's Cipher
|
|
Rivet's Cipher
|
Strong encryption using up to 2048-bit encryption.
|
|
Blowfish / Twofish
|
64-bit encryption / 128-bit encryption
|
|
IDEA
|
Similar to DES but more secure. Uses 128-bit encryption. Utilized in PGP (Pretty Good Privacy).
|
|
Symmetric Encryption
|
Requires both users to hold the same key.
|
|
Asymmetric Encryption
|
Requires both a public and private key. Public key encrypts and private key decrypts.
|
|
Block Cipher
|
Encrypts chunks of data at once.
|
|
Stream Cipher
|
Encrypts individual bits/bytes of data.
|
|
PKC
|
Public Key Cryptography
|
|
4 main systems of Asymmetric Algorithms.
|
RSA, Diffie-Helman, ECC, El Gamal
|
|
RSA
|
Is used in SSL. Uses large integers as a foundation.
|
|
Diffie-Helman
|
Used to transmit keys security. This method breaks keys into multiple parts.
|
|
ECC
|
Elliptic Curve Cryptography.
|
|
Elliptic Curve Key
|
Used in cell phones and wireless hardware. This algorithm uses points on a curve to determine the necessary public/private combination.
|
|
El Gamal
|
Algorithm similar to D-H. DSA is based on El Gamal. Digital Signature Algorithm.
|
|
AES(128), AES(256), CAST, RC, Blowfish, Twofish, IDEA are examples of:
|
Symmetric Encryption
|
|
PKI
|
Public Key Infrastructure
|
|
Four (4) Key Components of PKI
|
Certificate Authority (CA), Registration Authority (RA), RSA, and Digital Certificats.
|
|
First step of sending an encrypted message. (PKI)
|
Obtain the user's public key.
|
|
CA
|
Certificate Authority
|
|
Certificate Authority
|
Organization responsible for issuing, revoking, and distributing certificates.
|
|
RA
|
Registration Authority
|
|
Registration Authority
|
A middle-man for the CA allowing for registration, key issuance, and validation. Does NOT issue certificates.
|
|
LRA
|
Local Registration Authority
|
|
Local Registration Authority
|
Similar to a registration authority but also verifies identity.
|
|
X.509
|
Most widely used certificate format.
|
|
What is the purpose of a certificate?
|
Binds the user's public key to their identity.
|
|
Certificate Policies
|
A CA can issue many different types of certificates an the CP determines how they are used.
|