A | B |
Confidentiality | ensures only authorized personnel access |
integrity | detects unauthorized modifications |
Authentication | Verifies the user or computer |
Nonrepudiation | user cannot deny sending data. |
Anti-replay | Prevents interception and sending later |
brute-force | trying each possible key |
ciphertext | encrypted text |
symmetric algorithm | uses the same key for encrypting and decrypting |
Data Encryption Standard (DES) | uses keys that are 56 bits long |
Triple DES (3DES) | 168 bits |
Advanced Encryption Standard (AES) | chosen by the U.S. National Institute for Standards (NIST). |
International Data Encryption Algorithm (IDEA) | 128-bit keys patented and requires licensing |
Blowfish | fast algorithm has a variable-length key ranging from 32 bits to 448 bits |
RC4 stream cipher | modifies key used for WEP |
hash function | takes data of any length and encrypts to create a fixed-size string of data |
Secure Hash Algorithm (SHA-1) | 160 bits long used by government agencies |
Message Digest 4 (MD4) | and Message Digest 5 (MD5 commonly used in applications that do not have to comply with U.S. |
asymmetric encryption | Public key and private key needed |
Digital signing | Public key cryptography usually uses a hash |
Key exchange | exchange key when there is no secure channel or method to create |
EFS | Combines symmetric and Asymmetric Encryption |