10 terms

DES

(a) No longer by the government

(b) Uses block cipher based on IBM's 128-bit Lucifer algorithms

(c) operates on 64-bit blocks of plaintext

(d) uses a 56-bit key

(b) Uses block cipher based on IBM's 128-bit Lucifer algorithms

(c) operates on 64-bit blocks of plaintext

(d) uses a 56-bit key

3DES

(a) uses three 56-bit keys

(b) encrypts-decrypts data 3 times, effictively making a 168-bit key

(c) uses 46 rounds in its computation

(d) works in 4 different modes

i. DES-EEE3 - uses three different keys for encryption, and the data is encrypted 3 times

ii. DES-EDE3 - uses 3 different keys for encryption, and the data is encrypted, decrypted, and encrypted

iii. DES-EEE2 - similar to DES-EEE3, but uses only 2 keys - the first and third encryptions use the same key

iv. DES-EDE2 - similar to DES-EDE3, but uses only 2 keys - the first and third encryptions use the same key

(b) encrypts-decrypts data 3 times, effictively making a 168-bit key

(c) uses 46 rounds in its computation

(d) works in 4 different modes

i. DES-EEE3 - uses three different keys for encryption, and the data is encrypted 3 times

ii. DES-EDE3 - uses 3 different keys for encryption, and the data is encrypted, decrypted, and encrypted

iii. DES-EEE2 - similar to DES-EEE3, but uses only 2 keys - the first and third encryptions use the same key

iv. DES-EDE2 - similar to DES-EDE3, but uses only 2 keys - the first and third encryptions use the same key

AES

(a) symmetric block cipher based on the Rijndael algorithm

(b) supports key sizes of 128, 192, 256

(c) number of computations are 10, 12, 14

(d) can be implemented in a wide range of processors, hardware, and environments

(e) low memory requirements

(f) can defend against timing attacks

(g) key lengths of 192 or 256 can provide extremely high level security

(h) has a low number of computation rounds

(b) supports key sizes of 128, 192, 256

(c) number of computations are 10, 12, 14

(d) can be implemented in a wide range of processors, hardware, and environments

(e) low memory requirements

(f) can defend against timing attacks

(g) key lengths of 192 or 256 can provide extremely high level security

(h) has a low number of computation rounds

Counter mode, CTR, with CCMP

(a) AES-based that comprises part of the 802.11i standard for wireless local area networks

(b) CCMP uses 128-bit blocks and cipher keys of 128, 192, 256

(b) CCMP uses 128-bit blocks and cipher keys of 128, 192, 256

Rijndael

(a) was the bases for AES

(b) shares AES characteristics, but supports mutiple block sizes

(b) shares AES characteristics, but supports mutiple block sizes

CAST

(a) 128-bit encryption algorithm that belongs to the Feist cipher class

(b) has 3 different round functions, a block size of 128 bits, and a variable key size of 128, 160, 192, 224, or 256 bits

(c) uses an SPN cryptosystem and a pair of subkeys per round

(b) has 3 different round functions, a block size of 128 bits, and a variable key size of 128, 160, 192, 224, or 256 bits

(c) uses an SPN cryptosystem and a pair of subkeys per round

SAFER

(a) type of patent-free algorithm that works on 64-bit or 128-bit blocks

(b) versions

i. SAFER-SK64

ii. SAFER-SK128

(c) used as encryption for Bluetooth

(b) versions

i. SAFER-SK64

ii. SAFER-SK128

(c) used as encryption for Bluetooth

Blowfish and Twofish

(a) block cipher

(b) works on 64-bit data blocks using a key length that can go up to 448 bits

(c) data blocks go through 16 rounds of cryptographic functions

(d) Twofish is a variation of Blowfish that uses 128, 192, or 256-bit keys with 128-bit blocks

(b) works on 64-bit data blocks using a key length that can go up to 448 bits

(c) data blocks go through 16 rounds of cryptographic functions

(d) Twofish is a variation of Blowfish that uses 128, 192, or 256-bit keys with 128-bit blocks

Rivest cipher 4 , RC4

(a) most commonly implemented stream cipher

(b) has a variable key size and is used in SSL

(b) has a variable key size and is used in SSL

Rivest cipher 5, RC5

(a) very fast block cipher

(b) block sizes of 32-bits, 64 bits, 128 bits, and the key size goes up to 2048 bits

(c) 3 versions

(b) block sizes of 32-bits, 64 bits, 128 bits, and the key size goes up to 2048 bits

(c) 3 versions