Encryption and Hashing Algorithms

0.0(0)
studied byStudied by 0 people
0.0(0)
full-widthCall Kai
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
GameKnowt Play
Card Sorting

1/13

flashcard set

Earn XP

Description and Tags

Includes symmetric, asymmetric, and hashing algorithms

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced
Call with Kai

No study sessions yet.

14 Terms

1
New cards

Data Encryption Standard (DES)

  • Symmetric algorithm

  • Block cipher

  • Not very secure

2
New cards

Triple DES (3DES)

  • Symmetric algorithm

  • Block cipher

  • More scrambling/security than DES

3
New cards

International Data Encryption Standard (IDEA)

  • Symmetric algorithm

  • Block cipher

  • Longer key length than DES, but uncommon

4
New cards

Advanced Encryption Standard (AES)

  • STRONG symmetric algorithm

  • Block cipher

  • De facto standard

  • Good for data at rest

5
New cards

RC4

  • Symmetric algorithm

  • Stream cipher for SSL/TLS and WEP

6
New cards

RC5

  • Symmetric algorithm

  • Block cipher

7
New cards

RC6

  • Symmetric algorithm

  • Stronger RC5, but less common than AES

8
New cards

Diffie-Hellman

  • Asymmetric algorithm

  • Used to conduct key exchanges over an unsecure network (like Internet)

  • Widely used for VPN tunnels as part of IPSec

9
New cards

RSA

  • Asymmetric algorithm

    • Used for key exchange, encryption, and digital signatures with large key sizes

10
New cards

Elliptic Curve Cryptography (ECC)

  • Asymmetric algorithm

  • Efficient, smaller key size with similar security to RSA

  • Popular with mobile devices and low computing power machines

11
New cards

MD5

  • Hashing algorithm

  • Insecure

12
New cards

SHA Family

  • Hashing algorithm

  • SHA-1, SHA-2, and SHA-3 contain hashing methods more secure than the previous

  • Longer bit number = more secure

13
New cards

RIPEMD

  • Hashing algorithm

  • Uncommon competitor to SHA family

14
New cards

HMAC

  • Hashing algorithm

  • Hash-based Message Authentication Code

  • Used to check integrity of message