IS 450 Network Cipher Network Encryption Vocabs

0.0(0)
studied byStudied by 0 people
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/9

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

10 Terms

1
New cards

Advanced Encryption Standard (AES)

Is a symmetric encryption algorithm widely adopted as a standard by governments and organizations worldwide. It supports key lengths of 128, 192, or 256 bits and is used to encrypt data at rest and in transit.

2
New cards

Triple Data Encryption Standard (3DES)

Is a symmetric encryption algorithm that applies
the Data Encryption Standard (DES) cipher three times to each data block. While less secure than AES, it is still used in some legacy systems and applications.

3
New cards

Rivest Cipher (RC)

The RC family includes various symmetric encryption algorithms developed
by Ron Rivest. These algorithms, such as RC4 and RC6, have been widely used in both software
and hardware applications.

4
New cards

Blowfish

is a symmetric block cipher designed to replace DES. It supports variable key
lengths and is known for its simplicity and speed. While it's no longer considered secure for
some applications due to advances in cryptanalysis, it's still used in legacy systems.

5
New cards

Twofish

Twofish is a symmetric block cipher designed as a candidate for the Advanced
Encryption Standard (AES). It operates on 128-bit blocks and supports key lengths of up to 256
bits. While not selected as the AES standard, it remains a popular choice for encryption.

6
New cards

RC4 (Rivest Cipher 4)

Is a stream cipher known for its simplicity and speed. It's widely used
in applications such as TLS/SSL, WEP, and WPA for encryption. However, due to vulnerabilities,
it's now considered insecure and is being phased out.

7
New cards

ChaCha20

is a stream cipher designed by Daniel J. Bernstein. It's known for its
simplicity and high performance on a wide range of platforms. It's often used in conjunction with
the Poly1305 authenticator for encryption and authentication.

8
New cards

Salsa20

is another stream cipher developed by Daniel J. Bernstein. It's designed to be
fast and secure, making it suitable for various applications, including disk encryption, VPNs, and
secure messaging protocols.

9
New cards

Elliptic Curve Cryptography (ECC)

is a type of public-key cryptography that uses the
algebraic structure of elliptic curves to create cryptographic keys. It offers smaller key sizes
compared to traditional algorithms like RSA while providing equivalent security.

10
New cards

RSA (Rivest-Shamir-Adleman)

is a widely used asymmetric encryption algorithm for
securing data transmission and digital signatures. It's based on the difficulty of factoring large
prime numbers and is commonly used in HTTPS, SSL/TLS, and other secure communication
protocols.