SEC+ Encryption and Cryptography

0.0(0)
studied byStudied by 0 people
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/38

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

39 Terms

1
New cards

Symmetric Algorithms

Algorithms that use a single key for both encryption and decryption.

2
New cards

DES

Data Encryption Standard that uses a 64-bit key (56 effective bits due to parity) and encrypts data in 64-bit blocks through 16 rounds of transposition and substitution.

3
New cards

Triple DES

Utilizes three 56-bit keys, encrypts data with the first key, decrypts with the second key, and encrypts again with the third key, providing 112-bit key strength.

4
New cards

IDEA

International Data Encryption Algorithm, a symmetric block cipher with a 64-bit block size and a 128-bit key, faster and more secure than DES.

5
New cards

AES

Advanced Encryption Standard that supports 128-bit, 192-bit, or 256-bit keys and matching block sizes, widely adopted as the encryption standard for sensitive unclassified information.

6
New cards

Blowfish

A block cipher with key sizes ranging from 32 to 448 bits, developed as a DES replacement but not widely adopted.

7
New cards

Twofish

A block cipher supporting a 128-bit block size and key sizes of 128, 192, or 256 bits, open source and available for use.

8
New cards

Rivest Cipher

Includes RC4, RC5, and RC6; RC4 is a stream cipher with variable key sizes from 40 to 2048 bits, used in SSL and WEP.

9
New cards

Asymmetric Algorithms

Algorithms that use two separate keys: a public key for encryption and a private key for decryption.

10
New cards

Diffie-Hellman

An asymmetric algorithm used for secure key exchange.

11
New cards

RSA

An asymmetric algorithm used for secure data transmission.

12
New cards

Elliptic Curve Cryptography

An asymmetric algorithm that uses elliptic curves for encryption.

13
New cards

Hashing

Converts data into a fixed-size string (digest) using hash functions.

14
New cards

MD5

A widely used hashing algorithm that produces a 128-bit hash value.

15
New cards

SHA Family

A set of cryptographic hash functions designed by the National Security Agency.

16
New cards

RIPEMD

A family of cryptographic hash functions.

17
New cards

HMAC

Hash-based Message Authentication Code, a specific construction for creating a message authentication code based on a cryptographic hash function.

18
New cards

Public Key Infrastructure (PKI)

Framework managing digital keys and certificates for secure data transfer.

19
New cards

Digital Certificates

Electronic credentials verifying entity identity for secure communications.

20
New cards

Blockchain

Decentralized, immutable ledger ensuring data integrity and transparency.

21
New cards

Encryption Tools

Includes TPM, HSM, Key Management Systems, and Secure Enclave.

22
New cards

Obfuscation

Techniques such as steganography, tokenization, and data masking used to conceal data.

23
New cards

Cryptographic Attacks

Includes downgrade attacks, collision attacks, and quantum computing threats.

24
New cards

Symmetric vs Asymmetric

Symmetric encryption uses a single key, while asymmetric encryption uses a public and private key pair.

25
New cards

Hybrid Approach

Combines both symmetric and asymmetric encryption for optimal benefits.

26
New cards

Stream Cipher

Encrypts data bit-by-bit or byte-by-byte in a continuous stream.

27
New cards

Block Cipher

Breaks input data into fixed-size blocks before encryption, usually 64, 128, or 256 bits at a time.

28
New cards

Block Ciphers

Encryption algorithms that process fixed-size blocks of data.

29
New cards

Public Key Cryptography

A cryptographic system that uses a public key for encryption and a private key for decryption.

30
New cards

Confidentiality with Public Key

The process of encrypting data using the receiver's public key.

31
New cards

Non-Repudiation with Private Key

The process of encrypting data using the sender's private key to verify the sender's identity.

32
New cards

Integrity and Authentication with Digital Signature

Creating a hash digest of the message and encrypting it with the sender's private key.

33
New cards

Digital Signature

A hash digest of a message encrypted with the sender's private key to verify the sender's identity.

34
New cards

Elliptic Curve Cryptography (ECC)

A cryptographic approach that uses the algebraic structure of elliptical curves, efficient for mobile devices.

35
New cards

Hash Digest

A unique representation of the original data, always of the same length regardless of input length.

36
New cards

SHA-1

A hashing algorithm that produces a 160-bit hash digest, less prone to collisions than MD5.

37
New cards

SHA-2

A family of hashing algorithms that offers longer hash digests including SHA-224, SHA-256, SHA-348, SHA-512.

38
New cards

SHA-3

A hashing algorithm that uses 224-bit to 512-bit hash digests, more secure with 120 rounds of computations.

39
New cards

Digital Signature Algorithm (DSA)

An algorithm utilized for digital signatures that uses a 160-bit message digest.