WGU - D334
Leave the first rating Students also studied Terms in this set (47) Science Computer Science Computer Security and Reliability Save WGU D333 Ethics in Technology - W...332 terms DrkintrudrPreview WGU Course C839 - Intro to Crypto...293 terms WieldyStone2 Preview C839v5/D334 Additional Practice Teacher 165 terms ShawnD_Preview WGU C 81 terms aur Practice questions for this set Learn1 / 7Study using Learn Symmetric, Block Size: 64, Key Size: 40, Rounds: 18 Electronic Code Book (ECB)Block 1 encrypted = Cipher 1, Block 2 encrypted = Cipher 2 Cipher Block Chaining (CBC)IV XOR Block 1 = Cipher text 1, Cipher Text 1 XOR Block 2 = Cipher text 2.Cipher Feedback (CFB)IV encrypted XOR Block 1 = Cipher 1, Cipher 1 XOR Block 2 = Cipher 2 Output Feedback (OFB)IV encrypted XOR Block 1 = Cipher 1, Cipher 1 encrypted XOR Block 2 = Cipher 2 Choose an answer 1Rivest Cipher 2 (RC2)2Electronic Code Book (ECB) 3Ceasar Cipher4Counter Mode (CTR) Don't know?
Counter Mode (CTR)Nonce encrypted XOR Block 1 = Cipher 1, Nonce +1 encrypted XOR block 2 = Cipher 2 Rainbow TableA table of hash values and their corresponding plaintext values that can be used to look up password values if an attacker is able to steal a system's encrypted password file.HMACa fixed length string of bits similar to other hashing algorithms such as MD5 and SHA-1, but it also uses a secret key to add some randomness to the result.Pigpen Ciphera geometric simple substitution cipher, which exchanges letters for symbols which are fragments of a grid Rail Codescrambles text by writing it across rows and columns bifid ciphermaps letters in a grid to numeric values Playfair CipherUses a 5x5 table and a key word. Rest of the alphabet is placed on table in alphabetic order, skipping letters used in the keyword. You break up the message into two character chunks and return a single character value. If the letters appear on the same row of your table, replace them with the letters to the right. If it is on the same column, replace them with the letters below.Morse Codea system of dots and dashes that represent the alphabet Ceasar Ciphera technique for encryption that shifts the alphabet by some number of characters Viginere Cipherusing a series of different monoalphabet ciphers selected based on the letters of a keyword. A polyalphabetic cipher.One-time padan example of perfect (unbreakable) encryption, which is achieved by using, only once, a random polyalphabetic key that is as long the message itself.Four-Square Cipherfour squares of alphabet are created and two characters of plain text are mapped to two characters of cipher text Enigma MachineAn example of a one time pad encryption device.Data Encryption Standard (DES)Symmetric, Block size: 64, Key size: 56, Rounds: 16 Triple Data Encryption Standard (3DES)Symmetric, Block size: 64, Key size: 112, Rounds: 48 Advanced Encryption Standard (AES)Symmetric, Block size: 128, Key Size: 128,192,256, Rounds: 10, 12, 14 International Data Encryption Algorithm (IDEA) Symmetric, Block Size: 64, Key Size: 128, Rounds: 17+ SkipjackSymmetric, Block Size: 64, Key Size: 80, Rounds: 32 BlowfishSymmetric, Block Size: 64, Key Size: 128, 192, 256, Rounds: 16
TwofishSymmetric, Block Size: 128, Key Size: 128, 192, 256, Rounds: 16 CameliaSymmetric, Block Size 128, Key Size: 128, 192, 256, Rounds: 18/24 Rivest Cipher 5 (RC5)Symmetric, Block Size: 32, 64, 128, Key Size: 0 - 2,040, Rounds: 0-255 Rivest Cipher 2 (RC2)Symmetric, Block Size: 64, Key Size: 40, Rounds: 18 Rivest Cipher 6 (RC6)Symmetric, Block Size: Variable, Key Size: Variable, Rounds: 20 Extended Tiny Encryption Algorithm (XTEA)Block Size: 64, Key Size: 128, Rounds: Variable (64) Rivest Cipher 4 (RC4)Streaming symmetric algorithm one round of encryption. key sizes from 40 to 2048 bits in length Message Digest 4 (MD4) / Message Digest 5 (MD5) 128bit cryptographic hash Secure Hash Algorithm 1 (SHA-1)160bit cryptographic Hash Rivest, Shamir, Adelman (RSA)asymmetric, partially homomorphic that uses prime numbers 1024-4096 bit key size, 1 round.Elliptic Curve Cryptography (ECC)Asymmetric algorithm based upon mathematical problems involving the algebraic structure of elliptic curves over finite fields. digital signature algorithm El Gamal Encryption Algorithmasymmetric encryption, extension of diffie helman Digital Signature Algorithm (DSA)asymmetric encryption algorithm that is primarily used for creating digital signatures. based on concept of modular exponentiaion and discrete logarithm Diffie-HellmanA cryptographic algorithm that allows two users to share a secret key securely over a public network.PRESENTlightweight, 64 bit block, 80/128bit key size, 32 rounds XTEAlightweight, 64 bit block, 128 bit key size, variable rounds SIMONlightweight, 32/48/64/96/128 bit block, 64-276 bit key size CLEFIAlightweight, 128 bit block size, 128/192/256 bit key size Rabbitlightweight, 128 bit key size, 64bit Initialization vector Mickey v2lightweight, 80 bit key size, variable upto 80 bit initialization vector Triviumlightweight, 80 bit key size, 80 bit initialization vector Grainlightweight, 80 bit key size, 64 bit initialization vector
Enocorolightweight, 128 bit key size, 64 bit initialization vector Chaskeylightweight, 128 bit key size