Symmetric encryption algorithms


Terms in this set (...)

(a) No longer by the government
(b) Uses block cipher based on IBM's 128-bit Lucifer algorithms
(c) operates on 64-bit blocks of plaintext
(d) uses a 56-bit key
(a) uses three 56-bit keys
(b) encrypts-decrypts data 3 times, effictively making a 168-bit key
(c) uses 46 rounds in its computation
(d) works in 4 different modes
i. DES-EEE3 - uses three different keys for encryption, and the data is encrypted 3 times
ii. DES-EDE3 - uses 3 different keys for encryption, and the data is encrypted, decrypted, and encrypted
iii. DES-EEE2 - similar to DES-EEE3, but uses only 2 keys - the first and third encryptions use the same key
iv. DES-EDE2 - similar to DES-EDE3, but uses only 2 keys - the first and third encryptions use the same key
(a) symmetric block cipher based on the Rijndael algorithm
(b) supports key sizes of 128, 192, 256
(c) number of computations are 10, 12, 14
(d) can be implemented in a wide range of processors, hardware, and environments
(e) low memory requirements
(f) can defend against timing attacks
(g) key lengths of 192 or 256 can provide extremely high level security
(h) has a low number of computation rounds
Counter mode, CTR, with CCMP
(a) AES-based that comprises part of the 802.11i standard for wireless local area networks
(b) CCMP uses 128-bit blocks and cipher keys of 128, 192, 256
(a) was the bases for AES
(b) shares AES characteristics, but supports mutiple block sizes
(a) 128-bit encryption algorithm that belongs to the Feist cipher class
(b) has 3 different round functions, a block size of 128 bits, and a variable key size of 128, 160, 192, 224, or 256 bits
(c) uses an SPN cryptosystem and a pair of subkeys per round
(a) type of patent-free algorithm that works on 64-bit or 128-bit blocks
(b) versions
ii. SAFER-SK128
(c) used as encryption for Bluetooth
Blowfish and Twofish
(a) block cipher
(b) works on 64-bit data blocks using a key length that can go up to 448 bits
(c) data blocks go through 16 rounds of cryptographic functions
(d) Twofish is a variation of Blowfish that uses 128, 192, or 256-bit keys with 128-bit blocks
Rivest cipher 4 , RC4
(a) most commonly implemented stream cipher
(b) has a variable key size and is used in SSL
Rivest cipher 5, RC5
(a) very fast block cipher
(b) block sizes of 32-bits, 64 bits, 128 bits, and the key size goes up to 2048 bits
(c) 3 versions