- Symmetric - equal keys held by both parties, which allow both encrypting and decrypting the information
- Asymmetric - keys are split, with a public key being able to encrypt, and a private key being able to decrypt, or vice versa
- Unbreakable - truly secure encryption, the holy grail for cryptography
- Hashing - non-reversible functions for checking data integrity
#hashing #cryptography
- non-reversible function
- generates a unique hash based on content of information.
- allows verification that data is intact and hasn't been modified
- SHA-1 - 160 bits, fixed output
- SHA-2 - 256 bits, fixed output
- MD5 - 128 bits, fixed output
- NTLM - 128 bits, fixed output - Microsoft's NT LAN Manager
Identical keys held by both parties, which allow both encrypting and decrypting the information
- #symmetric-cryptography
- Rivest Cipher 4
- SYMMETRIC
- STREAM cypher
- high speed
- considered insecure
- #symmetric-cryptography
- "Pretty Good Privacy"
- software suite uses primarily for encrypting email communication
- used to sign, encrypt, and decrypt texts, emails, files, directories and disk partition
- uses RSA or DSA algorithms
- #symmetric-cryptography
- Advanced Encryption Standard (AES), also known as Rijndael
- BLOCK cipher
- SYMMETRIC
- block size 128 bits, key sizes up to 256 bits
- Now the fastest and most secure algorithm
- considered to be quantum resistant (for AES-256)
- #symmetric-cryptography
- BLOCK cipher
- SYMMETRIC
- block size 128 bits, key sizes up to 256 bits
- now slower than AES
- BLOCK cipher
- SYMMETRIC
- block size 128 bits, key sizes up to 256 bits
- #symmetric-cryptography
- Data Encryption Standard (DES)
- BLOCK cipher
- SYMMETRIC
- 56 bits
- Developed in the 1970s at IBM
- outdated - short key length
- #symmetric-cryptography
- Triple DES (3DES or TDES), officially "Triple Data Encryption Algorithm"
- BLOCK cipher
- SYMMETRIC
- 56 bits
- Outdated/insecure - short key length
Also known as Public-key cryptography.
Keys are split into pairs, with a public key being able to encrypt, and a private key being able to decrypt, or vice versa, using one-way mathematical functions
Examples:
- Diffie–Hellman key exchange protocol
- DSS (Digital Signature Standard)
- RSA
- Elliptic-curve cryptography
- Elliptic Curve Digital Signature Algorithm (ECDSA)
- Elliptic-curve Diffie–Hellman (ECDH)
#asymmetric #encryption
- mathematical method of securely exchanging cryptographic keys over a public channel
- ASYMMETRIC
#asymmetric #encryption
- Digital Signature Algorithm (DSA)
- a public-key cryptosystem and Federal Information Processing Standard for digital signatures
- used in SSL
- ASYMMETRIC
#asymmetric #encryption
- Digital Signature Standard (DSS)
- incorporates the Digital Signature Algorithm
- ASYMMETRIC
#asymmetric #encryption
- Elliptic-curve cryptography (ECC)
- based on algebra of elliptic curves
- ASYMMETRIC
- smaller key size than other methods
- considered quantum-vulnerable
- Examples:
- ECDSA
- Elliptic Curve Digital Signature Algorithm (ECDSA)
- Elliptic-curve Diffie–Hellman (ECDH)
#asymmetric #encryption
- RSA (Rivest–Shamir–Adleman)
- ASYMMETRIC
- one of the oldest public-key cryptographic systems, invented in 1977
- key length generally 1024 to 4096 bits
- used in OpenSSL
- considered quantum-vulnerable
- the only known unbreakable encryption method
- masking messages with pre-known and shared string of random characters & digits, each only used one time
- Algorithms which were originally secure prior may now be vulnerable to breaking with quantum computers
- quantum resistance - algorithms designed in a way that makes them secure against breaking with quantum computers