Term

Definition
Electronic Code Block  Block Cipher Sucks because the the output is put in same order every time, you can figure out information. Information goes in, Encrypted, Next 


Term

Definition
Cipher Block Chaining  Block Cipher First block is XOR'd against IV.
Then encrypted.
Then the encryption for the first block becomes IV for the next sets of block
Repeat 


Term

Definition
Cipher Feedback  Block Cipher
IV is encrypted.
XOR the output of the IV with the input
This XOR output is then used as the IV of the next block
new IV is encrypted. Repeat. 


Term

Definition
Output Feedback  Block Cipher > Stream Cipher
IV is Encrypted
Encrypted IV is XOR'd against input of first block
Keep using original IV and go on to next block
(Not secured?) 


Term

Definition
Counter Mode  Block Cipher Random or PsuedoRandom NONCE value concatenate with counter
NONCE concatenate Counter then encrypts it as IV
XOR'd Against the First block,
Use NONCE and increment the counter as Next IV to be encrypted then to be XOR'd against next block 


Term

Definition
Asymmetric Algorithm. Very good one. Not the most space friendly though
Uses 2 very high Prime Number to use as key 


Term

Definition
HashBased Message Authentication Code  MAC Stream Cipher  Integrity Purpose 


Term

Definition
Pretty Good Privacy: super old thing but it is used for encryption and decryption using a RANDOM TEMPORARY key and a public key. Relies on trust of actual people, used to have to call people to issue session keys. Web of Trust between multiple certificates, at the end of the day it was a bit of a failiure but does work just fine in a pki world.
Encrypts email, pki support , and S/MIME email _______________________________________ Encrypt Data with Random Temporary Key Encrypt Random Temporary Key with Receivers Public Key Encrypted Data and Encrypted Key is Encrypted Message 


Term

Definition
Sets up a session via Asymmetric then after it is set up switch to symmetric . Secure way to trade keys (color concept) Can ask for Elliptic Curve in group for extra security, able to hold VERY large keys ________________________________________ (g^a mod p)^b mod p = g^(ab) mod p (g^b mod p)^a mod p = g^(ba) mod p 


Term

Definition
Symmetric  Block Cipher Very good Symmetric key algorithm Fixed Block Size (128 bit) and key sizes of 128,192 or 256 bits. 


Term

Definition
Symmetric  Block Cipher Symmetric used to be good but is kinda shitty now. 64bit blocks  56bit key  64bit output Encryption uses 48 different bits key for everyone round of encryption. Decryption is the inverse process making it inherently vulnerable 


Term

Definition
Symmetric  Block Cipher Symmetric Good now but kinda big. Literally just one shitty algorithm kaio ken x3 but its secure I guess 


Term

Definition
Elliptic curve algorithm. Asymmetric Key that is very good but is a lot smaller and space conscious
Uses key sizes of 56bits, 112bits or 168bits. 


Term

Definition
Symmetric  Stream Cipher Symmetric Good but not that popular
402048 bits (often use as encryption mechanism in SSL and TLS when encrypting HTTPS)
Can now be broken into 


Term

Definition
Symmetric  Block Cipher Encrypts data at 64 bit block Key Size: 32  448
Faster than AES 


Term

Definition
Symmetric  Block Cipher Encrypts data at 128 bit blocks Keysize: 128, 192, 256 bits 


Term

Definition
cryptographic system generates random public keys for each session and it doesnâ€™t use a deterministic algorithm to do so. In other words, given the same input, the algorithm will create a different public key 

