Security+ Cryptography

Ace your homework & exams now with Quizwiz!

SHA

Secure Hash Algorithm is another hashing algorithm. 224, 256, 384, 512 bits.

S/MINE

Secure/Multipurpose Internet Mail Extensions (S/MIME) is one of the most popular standards used to digitally sign and encrypt email

Non-repudiation

prevents a party from denying an action

Digital Signature

A digital signature is an encrypted hash of a message. The sender's private key encrypts the hash of the message to create the digital signature. The recipient decrypts the hash with the sender's public key. If successful, it provides authentication, non-repudiation, and integrity. Authentication identifies the sender. Integrity verifies the message has not been modified. Non-repudiation prevents senders from later denying they sent an email.

DES

Data Encryption Standard-is a symmetric block cipher that was widely used for many years, dating back to the 1970s. It encrypts data in 64-bit blocks.

Diffie-Hellman

Diffie-Hellman is a secure method of sharing symmetric encryption keys over a public network. ECDHE is a version of Diffie-Hellman that uses elliptic curve cryptography to generate encryption keys.

ECC

Elliptic Curve Cryptography is commonly used with small wireless devices because it doesn't take much processing power to achieve the desired security.

HMAC

Hash based message authentication code is a fixed length string of bits similar to other hashing such as MD5 and SHA-1. Uses a shared secret key to add some randomness to the result and only the sender and receiver know the secret key.

HMAC-MD5

Hasing-Authenticity creates 128-bit hashes

HMAC-SHA1

Hasing-Authenticity creates 160-bit hashes

Md5

Hasing-Integrity creates 128-bit hashes

SHA-1

Hasing-Integrity creates 160-bit hashes

SHA-2

Hasing-Integrity creates 224,256,384, or 512-bit hashes

Blowfish

It encrypts data in 64-bit blocks and supports key sizes between 32 and 448 bits. Bruce Schneier (a widely respected voice in IT security) designed Blowfish as a general-purpose algorithm to replace DES.

LANMAN

LAN Manager-is a very old authentication protocol used to provide backward compatibility to Windows 95, 98, and ME clients. LANMAN has significant weaknesses with how it stores the password.

MD5

Message Digest 5 is a common hashing algorithm that produces a 128-bit has. Displayed as 32 hexadecimal characters and use numbers 0-9 and letters a-f.

NTLM

NT LAN Manager- as an improvement over LANMAN. NTLMv1 uses an MD4 hash of the user's password, and for backward compatibility it also uses the LANMAN hash if the password is 14 characters or less. Both LANMAN and MD4 are considered compromised, resulting in known vulnerabilities with NTLMv1 today. NTLMv2 uses a completely different process and uses the more secure MD5 algorithm.

PBKDF2

Password-Based Key Derivation Function 2

RIPEMD

RACE Integrity Primitives Evaluation Message Digest (RIPEMD) is another hash function. Different versions create different size hashes. RIPEMD-160 creates 160-bit, fixed-size hashes. Other versions create hash sizes of 128 bits, 256 bits, and 320 bits.

RSA

RSA is widely used to protect data such as email and other data transmitted over the Internet. It uses both a public key and a private key in a matched pair.

Symmetric encryption

Symmetric encryption uses the same key to encrypt and decrypt data. For example, when transmitting encrypted data, symmetric encryption algorithms use the same key to encrypt and decrypt data at both ends of the transmission media. RADIUS uses symmetric encryption.

AES

The Advanced Encryption Standard is a strong symmetric block cipher that encrypts data in 128-bit blocks. AES uses 128-bit, 192-bit, or 256-bit keys.

RC4

The most commonly used version is RC4 (also called ARC4), which is a symmetric stream cipher and it can use between 40 and 2,048 bits.

Email encryption

The recipient's public key encrypts. The recipients private key decrypts.

Web site encryption

The web site's public key encrypts (a symmetric key) The web site's private key decrypts ( a symmetric key) The symmetric key encrypts data in the web site session.

3DES

Triple Data Encryption Standard- it encrypts data using the DES algorithm in three separate passes and uses multiple keys. 3DES uses key sizes of 56 bits, 112 bits, or 168 bits.

Twofish

Twofish is related to Blowfish, but it encrypts data in 128-bit blocks and it supports 128-, 192-, or 256-bit keys. It was one of the finalist algorithms evaluated by NIST for AES.

Static Asymmetric keys

are semipermanent and stay the same over a long period of time

Block ciphers

encrypt data in blocks such as 64-bit or 128-bit blocks

Stream ciphers

encrypt data one bit at a time.

Ephermal Asymmetric keys

have short lifetimes and are recreated for each session.

Digital Signatures

provide authentication, non-repudiation, and integrity. The senders private key encrypts or signs The senders public key decrypts

Asymmetric encryption

uses two keys (public and private) created as a matched pair.

Authentication

validates an identity

Hasing

verifies integrity for data such as email, downloaded files, and files stored on a disk. A hash is a number created with a hashing algorithm, and is sometimes listed as a checksum.


Related study sets

Chaptire 7: Présentez une entreprise !

View Set

Chapter 10: Externalities Test Prep

View Set

CompTIA A+ 220-902 Scenario Questions

View Set

PHARM EXAM 2 MCQS and Powerpoint Questions

View Set

PRS Inservice- Breast Reconstruction

View Set

10年文法80-稱呼A為B-SVOC句型

View Set

Developmental Psychology Questions

View Set

Christ and Church- Chapter 3 Test

View Set

Assessment and Management of Problems Related to Male Reproductive Processes

View Set

Biology Chapter 4, Biology Plant cells and photosynthesis

View Set