Search
Create
Log in
Sign up
Log in
Sign up
Symmetric encryption algorithms
STUDY
Flashcards
Learn
Write
Spell
Test
PLAY
Match
Gravity
Terms in this set (10)
DES
(a) No longer by the government
(b) Uses block cipher based on IBM's 128-bit Lucifer algorithms
(c) operates on 64-bit blocks of plaintext
(d) uses a 56-bit key
3DES
(a) uses three 56-bit keys
(b) encrypts-decrypts data 3 times, effictively making a 168-bit key
(c) uses 46 rounds in its computation
(d) works in 4 different modes
i. DES-EEE3 - uses three different keys for encryption, and the data is encrypted 3 times
ii. DES-EDE3 - uses 3 different keys for encryption, and the data is encrypted, decrypted, and encrypted
iii. DES-EEE2 - similar to DES-EEE3, but uses only 2 keys - the first and third encryptions use the same key
iv. DES-EDE2 - similar to DES-EDE3, but uses only 2 keys - the first and third encryptions use the same key
AES
(a) symmetric block cipher based on the Rijndael algorithm
(b) supports key sizes of 128, 192, 256
(c) number of computations are 10, 12, 14
(d) can be implemented in a wide range of processors, hardware, and environments
(e) low memory requirements
(f) can defend against timing attacks
(g) key lengths of 192 or 256 can provide extremely high level security
(h) has a low number of computation rounds
Counter mode, CTR, with CCMP
(a) AES-based that comprises part of the 802.11i standard for wireless local area networks
(b) CCMP uses 128-bit blocks and cipher keys of 128, 192, 256
Rijndael
(a) was the bases for AES
(b) shares AES characteristics, but supports mutiple block sizes
CAST
(a) 128-bit encryption algorithm that belongs to the Feist cipher class
(b) has 3 different round functions, a block size of 128 bits, and a variable key size of 128, 160, 192, 224, or 256 bits
(c) uses an SPN cryptosystem and a pair of subkeys per round
SAFER
(a) type of patent-free algorithm that works on 64-bit or 128-bit blocks
(b) versions
i. SAFER-SK64
ii. SAFER-SK128
(c) used as encryption for Bluetooth
Blowfish and Twofish
(a) block cipher
(b) works on 64-bit data blocks using a key length that can go up to 448 bits
(c) data blocks go through 16 rounds of cryptographic functions
(d) Twofish is a variation of Blowfish that uses 128, 192, or 256-bit keys with 128-bit blocks
Rivest cipher 4 , RC4
(a) most commonly implemented stream cipher
(b) has a variable key size and is used in SSL
Rivest cipher 5, RC5
(a) very fast block cipher
(b) block sizes of 32-bits, 64 bits, 128 bits, and the key size goes up to 2048 bits
(c) 3 versions
YOU MIGHT ALSO LIKE...
Symmetric Encryption Sec+, np
40 Terms
Natividad_Pestana
Symmetric Encryption
23 Terms
jmo93
3.3.3 Symmetric Encryption Facts
15 Terms
JoeMac61299__
3.3 Symmetric Encryption
13 Terms
JoeMac61299__
OTHER SETS BY THIS CREATOR
Symmetric encryption algorithms
10 Terms
jcedwards2012
Symmetric encryption algorithms
10 Terms
jcedwards2012
Combo with "Guide to TCP/IP Key Terms, Chapter 1" and 1 other
154 Terms
jcedwards2012
Comptia A+ Certification 220-801/802
350 Terms
jcedwards2012
;