1/13
Includes symmetric, asymmetric, and hashing algorithms
Name | Mastery | Learn | Test | Matching | Spaced | Call with Kai |
|---|
No study sessions yet.
Data Encryption Standard (DES)
Symmetric algorithm
Block cipher
Not very secure
Triple DES (3DES)
Symmetric algorithm
Block cipher
More scrambling/security than DES
International Data Encryption Standard (IDEA)
Symmetric algorithm
Block cipher
Longer key length than DES, but uncommon
Advanced Encryption Standard (AES)
STRONG symmetric algorithm
Block cipher
De facto standard
Good for data at rest
RC4
Symmetric algorithm
Stream cipher for SSL/TLS and WEP
RC5
Symmetric algorithm
Block cipher
RC6
Symmetric algorithm
Stronger RC5, but less common than AES
Diffie-Hellman
Asymmetric algorithm
Used to conduct key exchanges over an unsecure network (like Internet)
Widely used for VPN tunnels as part of IPSec
RSA
Asymmetric algorithm
Used for key exchange, encryption, and digital signatures with large key sizes
Elliptic Curve Cryptography (ECC)
Asymmetric algorithm
Efficient, smaller key size with similar security to RSA
Popular with mobile devices and low computing power machines
MD5
Hashing algorithm
Insecure
SHA Family
Hashing algorithm
SHA-1, SHA-2, and SHA-3 contain hashing methods more secure than the previous
Longer bit number = more secure
RIPEMD
Hashing algorithm
Uncommon competitor to SHA family
HMAC
Hashing algorithm
Hash-based Message Authentication Code
Used to check integrity of message