Security+ SY0-701 Cryptography Algorithms Cheat Sheet

0.0(0)
studied byStudied by 0 people
GameKnowt Play
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/34

flashcard set

Earn XP

Description and Tags

Vocabulary flashcards covering symmetric and asymmetric algorithms, hash functions, password hashing and key-stretching, and common block cipher modes from the notes.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

35 Terms

1
New cards

AES (Advanced Encryption Standard)

Block cipher with 128-bit blocks; key sizes of 128, 192, or 256 bits; modern standard and secure.

2
New cards

DES (Data Encryption Standard)

Block cipher with a 56-bit key and 64-bit block; legacy and insecure.

3
New cards

3DES (Triple DES)

Block cipher with 112/168-bit effective key length and a 64-bit block; deprecated due to slower performance and vulnerabilities.

4
New cards

IDEA (International Data Encryption Algorithm)

Block cipher with a 128-bit key and 64-bit block; used in older PGP implementations.

5
New cards

Blowfish

Block cipher with a variable key length (32-448 bits) and a 64-bit block; older but fast.

6
New cards

Twofish

Block cipher with a 128/192/256-bit key and a 128-bit block; AES finalist.

7
New cards

Camellia

Block cipher with a 128/192/256-bit key and a 128-bit block; alternative to AES.

8
New cards

Serpent

Block cipher with a 128/192/256-bit key and a 128-bit block; AES finalist, generally slower.

9
New cards

CAST-128/CAST-256

Block cipher with a variable key and variable block size; used in some apps.

10
New cards

RC4

Stream cipher with a variable key size; deprecated and insecure.

11
New cards

ChaCha20

Stream cipher with a 256-bit key; modern, secure, fast.

12
New cards

Salsa20

Stream cipher with a 256-bit key; predecessor to ChaCha; largely superseded.

13
New cards

PBKDF2

Key stretching function using salt and adjustable iterations; widely used to derive keys from passwords.

14
New cards

bcrypt

Blowfish-based password-hashing function with a configurable cost factor; adaptive and salt-aware.

15
New cards

scrypt

Memory-hard key-stretching function designed to resist GPU/ASIC attacks; CPU/memory intensive.

16
New cards

Argon2

PHC winner; memory/time configurable password hashing; modern and secure.

17
New cards

MD5

Hash function with a 128-bit output; outdated due to collision vulnerabilities.

18
New cards

SHA-1

Hash function with a 160-bit output; deprecated due to collision attacks.

19
New cards

SHA-2

Family with 224-512 bit outputs (e.g., SHA-256, SHA-512); secure and widely used.

20
New cards

SHA-3

New standard hash family with 224-512 bit outputs; designed as a secure alternative.

21
New cards

RIPEMD-160

Hash function with a 160-bit output; alternative secure hash, less common today.

22
New cards

RSA

Asymmetric algorithm; typically 2048+ bit keys; widely used for encryption and digital signatures.

23
New cards

Diffie-Hellman (DH)

Key exchange protocol for secure key agreement; typically 2048+ bit groups.

24
New cards

ElGamal

Asymmetric algorithm for encryption and signatures; operates on discrete logarithm groups.

25
New cards

DSA (Digital Signature Algorithm)

Digital signature algorithm; commonly 1024-3072 bit keys; used for signatures only.

26
New cards

ECC (Elliptic Curve Cryptography)

Asymmetric cryptography using elliptic curves; smaller key sizes (160-521 bits) for equivalent security.

27
New cards

ECDH (Elliptic Curve Diffie-Hellman)

Elliptic-curve-based key exchange; establishes a shared secret.

28
New cards

ECDSA (Elliptic Curve Digital Signature Algorithm)

Elliptic-curve digital signature scheme; signatures with ECC.

29
New cards

EdDSA (Edwards-curve Digital Signature Algorithm)

Modern ECC-based signature scheme (e.g., Ed25519/Ed448) offering high security and speed.

30
New cards

ECB (Electronic Codebook)

Block cipher mode; each block encrypted independently; insecure due to pattern leakage.

31
New cards

CBC (Cipher Block Chaining)

Block cipher mode where each block is XORed with the previous ciphertext; uses an IV.

32
New cards

CFB (Cipher Feedback)

Block cipher mode that turns a block cipher into a self-synchronizing stream cipher; uses IV.

33
New cards

OFB (Output Feedback)

Block cipher mode that generates a keystream independent of ciphertext; uses IV.

34
New cards

CTR (Counter) mode

Block cipher mode that turns a block cipher into a stream cipher by encrypting a counter; uses nonce/IV.

35
New cards

GCM (Galois/Counter Mode)

Authenticated encryption mode combining CTR with GHASH for both confidentiality and integrity.