Search
Browse
Create
Log in
Sign up
Log in
Sign up
Upgrade to remove ads
Only $2.99/month
Symmetric encryption algorithms
STUDY
Flashcards
Learn
Write
Spell
Test
PLAY
Match
Gravity
Terms in this set (10)
DES
(a) No longer by the government
(b) Uses block cipher based on IBM's 128-bit Lucifer algorithms
(c) operates on 64-bit blocks of plaintext
(d) uses a 56-bit key
3DES
(a) uses three 56-bit keys
(b) encrypts-decrypts data 3 times, effictively making a 168-bit key
(c) uses 46 rounds in its computation
(d) works in 4 different modes
i. DES-EEE3 - uses three different keys for encryption, and the data is encrypted 3 times
ii. DES-EDE3 - uses 3 different keys for encryption, and the data is encrypted, decrypted, and encrypted
iii. DES-EEE2 - similar to DES-EEE3, but uses only 2 keys - the first and third encryptions use the same key
iv. DES-EDE2 - similar to DES-EDE3, but uses only 2 keys - the first and third encryptions use the same key
AES
(a) symmetric block cipher based on the Rijndael algorithm
(b) supports key sizes of 128, 192, 256
(c) number of computations are 10, 12, 14
(d) can be implemented in a wide range of processors, hardware, and environments
(e) low memory requirements
(f) can defend against timing attacks
(g) key lengths of 192 or 256 can provide extremely high level security
(h) has a low number of computation rounds
Counter mode, CTR, with CCMP
(a) AES-based that comprises part of the 802.11i standard for wireless local area networks
(b) CCMP uses 128-bit blocks and cipher keys of 128, 192, 256
Rijndael
(a) was the bases for AES
(b) shares AES characteristics, but supports mutiple block sizes
CAST
(a) 128-bit encryption algorithm that belongs to the Feist cipher class
(b) has 3 different round functions, a block size of 128 bits, and a variable key size of 128, 160, 192, 224, or 256 bits
(c) uses an SPN cryptosystem and a pair of subkeys per round
SAFER
(a) type of patent-free algorithm that works on 64-bit or 128-bit blocks
(b) versions
i. SAFER-SK64
ii. SAFER-SK128
(c) used as encryption for Bluetooth
Blowfish and Twofish
(a) block cipher
(b) works on 64-bit data blocks using a key length that can go up to 448 bits
(c) data blocks go through 16 rounds of cryptographic functions
(d) Twofish is a variation of Blowfish that uses 128, 192, or 256-bit keys with 128-bit blocks
Rivest cipher 4 , RC4
(a) most commonly implemented stream cipher
(b) has a variable key size and is used in SSL
Rivest cipher 5, RC5
(a) very fast block cipher
(b) block sizes of 32-bits, 64 bits, 128 bits, and the key size goes up to 2048 bits
(c) 3 versions
THIS SET IS OFTEN IN FOLDERS WITH...
Types of ciphers
11 terms
Asymmetric algorithms
7 terms
Cryptanalysis and attacks
19 terms
Hash algorithms
6 terms
YOU MIGHT ALSO LIKE...
Symmetric Encryption Sec+, np
40 terms
Symmetric Encryption
23 terms
Domain 6: Cryptography (11%)
243 terms
Cryptography ECES
150 terms
OTHER SETS BY THIS CREATOR
Statistical Terms and Descriptions
4 terms
Security Operations
3 terms
Vulnerability Scanners
10 terms
Types of keys
2 terms