WGU D334 Cryptography Algorithms Overview (Symmetric-Block) Joe_Luster Modified 22/06/24 Save Share Cryptography Algorithms Symmetric Ciphers Block Cipher Algorithms Stream Cipher Algorithms Symmetric Cipher uses the same key for both encryption and decryption.• Block Cipher encrypts data in fixed-size blocks. Examples include DES, AES, Blowfish.• Stream Cipher encrypts data one bit or byte at a time. Examples include RC4, FISH, PIKE.• DES (Data Encryption Standard) is a symmetric-key algorithm for digital data encryption.• 3DES (Triple Data Encryption Algorithm) applies DES cipher three times to each data block.• AES (Advanced Encryption Standard) is a widely used symmetric encryption algorithm.• Blowfish is a symmetric-key block cipher designed by Bruce Schneier.• Twofish is a successor to Blowfish, a symmetric key block cipher with a block size of 128 bits.• Serpent is a symmetric key block cipher finalist in the AES competition.• RCA is a type of stream cipher.• RC4 is a widely used stream cipher.• FISH and PIKE are stream ciphers, with PIKE being the successor to FISH.• Want to see your own notes transformed? Give it a go
Block Cipher Modes Asymmetric Ciphers Asymmetric Cipher Historical Ciphers Historical Ciphers Extras ECB (Electronic Codebook) is a mode of operation for block ciphers.• CBC (Cipher-Block Chaining) is a mode of operation for block ciphers.• PCBC (Propagating Cipher-Block Chaining) is a mode of operation for block ciphers.• CFB (Cipher Feedback) is a mode of operation for block ciphers.• OFB (Output Feedback) is a mode of operation for block ciphers.• CTR (Counter) is a mode of operation for block ciphers.• Asymmetric Cipher uses a pair of keys – a public key for encryption and a private key for decryption.• RSA (Rivest-Shamir-Adleman) is a widely used asymmetric encryption algorithm.• ECC (Elliptic Curve Cryptography) is an approach to public-key cryptography based on elliptic curves.• El Gamal is an asymmetric key encryption algorithm.• DSA (Digital Signature Algorithm) is used for digital signatures.• Diffie Hellman (DH) is a method of securely exchanging cryptographic keys over a public channel.• Historical Ciphers are early encryption methods that are no longer secure by modern standards.• Atbash is a simple substitution cipher.• Caesar is a substitution cipher where each letter is shifted a fixed number of places.• ROT-13 is a simple substitution cipher that shifts characters 13 places in the alphabet.• Vigenere is a polyalphabetic substitution cipher.• Playfair is a digraph substitution cipher.• Want to see your own notes transformed?
This product is enhanced with AI and may provide incorrect or problematic content. Please report any content that needs review.Key Exchanges Hash Functions
MAC/HMAC
NSA Suite B Key Exchanges are methods for securely exchanging encryption keys.• Diffie Hellman (DH) is a method of securely exchanging cryptographic keys over a public channel.• Menezes-Qu-Vanstone (MQV) is a key agreement protocol.• Key Exchange Algorithm (KEA) is a key exchange algorithm used by the NSA.• Elliptic Curve DH (ECDH) is a key exchange protocol based on elliptic curve cryptography.• Hash Functions convert input data into a fixed-size string of characters.• MD5 (Message Digest Algorithm 5) is a widely used hash function.• MD6 is a cryptographic hash function.• SHA-1, SHA-2, SHA-3 are Secure Hash Algorithms, a family of cryptographic hash functions.• FORK-256 is a cryptographic hash function.• RIPEMD-160 is a 160-bit cryptographic hash function.• MAC/HMAC (Message Authentication Code / Hash-based Message Authentication Code) are used for data integrity and authenticity.• NSA Suite B is a set of cryptographic algorithms endorsed by the National Security Agency.• AES with Galois/Counter Mode is used for symmetric encryption.• Elliptic-Curve DSA (ECDSA) is used for digital signatures.• Elliptic-Curve Diffie-Hellman (ECDH) is used for key agreement.• SHA-2 (SHA256 - SHA384) is used for message digest.• Want to see your own notes transformed?
Study this material Flashcards Practice questions Want to see your own notes transformed?