Term
|
Definition
Electronic Code Block | Block Cipher Sucks because the the output is put in same order every time, you can figure out information. Information goes in, Encrypted, Next |
|
|
Term
|
Definition
Cipher Block Chaining | Block Cipher First block is XOR'd against IV.
Then encrypted.
Then the encryption for the first block becomes IV for the next sets of block
Repeat |
|
|
Term
|
Definition
Cipher Feedback | Block Cipher
IV is encrypted.
XOR the output of the IV with the input
This XOR output is then used as the IV of the next block
new IV is encrypted. Repeat. |
|
|
Term
|
Definition
Output Feedback | Block Cipher -> Stream Cipher
IV is Encrypted
Encrypted IV is XOR'd against input of first block
Keep using original IV and go on to next block
(Not secured?) |
|
|
Term
|
Definition
Counter Mode | Block Cipher Random or PsuedoRandom NONCE value concatenate with counter
NONCE concatenate Counter then encrypts it as IV
XOR'd Against the First block,
Use NONCE and increment the counter as Next IV to be encrypted then to be XOR'd against next block |
|
|
Term
|
Definition
Asymmetric Algorithm. Very good one. Not the most space friendly though
Uses 2 very high Prime Number to use as key |
|
|
Term
|
Definition
Hash-Based Message Authentication Code | MAC Stream Cipher | Integrity Purpose |
|
|
Term
|
Definition
Pretty Good Privacy: super old thing but it is used for encryption and decryption using a RANDOM TEMPORARY key and a public key. Relies on trust of actual people, used to have to call people to issue session keys. Web of Trust between multiple certificates, at the end of the day it was a bit of a failiure but does work just fine in a pki world.
Encrypts email, pki support , and S/MIME email _______________________________________ Encrypt Data with Random Temporary Key Encrypt Random Temporary Key with Receivers Public Key Encrypted Data and Encrypted Key is Encrypted Message |
|
|
Term
|
Definition
Sets up a session via Asymmetric then after it is set up switch to symmetric . Secure way to trade keys (color concept) Can ask for Elliptic Curve in group for extra security, able to hold VERY large keys ________________________________________ (g^a mod p)^b mod p = g^(ab) mod p (g^b mod p)^a mod p = g^(ba) mod p |
|
|
Term
|
Definition
Symmetric | Block Cipher Very good Symmetric key algorithm Fixed Block Size (128 bit) and key sizes of 128,192 or 256 bits. |
|
|
Term
|
Definition
Symmetric | Block Cipher Symmetric used to be good but is kinda shitty now. 64-bit blocks - 56-bit key - 64-bit output Encryption uses 48 different bits key for everyone round of encryption. Decryption is the inverse process making it inherently vulnerable |
|
|
Term
|
Definition
Symmetric | Block Cipher Symmetric Good now but kinda big. Literally just one shitty algorithm kaio ken x3 but its secure I guess |
|
|
Term
|
Definition
Elliptic curve algorithm. Asymmetric Key that is very good but is a lot smaller and space conscious
Uses key sizes of 56-bits, 112-bits or 168-bits. |
|
|
Term
|
Definition
Symmetric | Stream Cipher Symmetric Good but not that popular
40-2048 bits (often use as encryption mechanism in SSL and TLS when encrypting HTTPS)
Can now be broken into |
|
|
Term
|
Definition
Symmetric | Block Cipher Encrypts data at 64 bit block Key Size: 32 - 448
Faster than AES |
|
|
Term
|
Definition
Symmetric | Block Cipher Encrypts data at 128 bit blocks Keysize: 128, 192, 256 bits |
|
|
Term
|
Definition
cryptographic system generates random public keys for each session and it doesn’t use a deterministic algorithm to do so. In other words, given the same input, the algorithm will create a different public key |
|
|