Algorithms

Card Set Information

Author:
codyyoung37
ID:
283729
Filename:
Algorithms
Updated:
2014-09-24 00:33:05
Tags:
comptia security algorithms
Folders:

Description:
Security algorithms
Show Answers:

Home > Flashcards > Print Preview

The flashcards below were created by user codyyoung37 on FreezingBlue Flashcards. What would you like to do?


  1. RC
    Symmetric
  2. IDEA
    Symmetric
  3. CAST
    Symmetric
  4. Twofish
    Symmetric
  5. Blowfish
    Symmetric
  6. DES
    Symmetric
  7. 3DES
    Symmetric
  8. AES, bits?
    Symmetric, 256 bit
  9. RSA, and how it does it, used for?
    Asymmetric, multiplies large prime numbers, encryption and digitgal signatures
  10. Diffie-Helman, and what for
    Asymmetric, symmetric key exchanges
  11. Elgamal
    Asymmetric
  12. ECC, and how it does it
    Asymmetric, algebraic sets of numbers
  13. MD5, strongest?, bits?
    Hashing, not strongest, 128 bits
  14. SHA-1, strongest?, bits?
    Hashing, yes strongest, 160 bits
  15. Which algorithm is used for key agreement?
    Diffie Helman
  16. Which algorithm is used for transmitting digital signatures and key exchanges?
    El Gamal
  17. Which algorithm uses less computing power and frequently used in smart phones?
    ECC
  18. Which algorithm is most publicly used for encryption and digital signatures?
    RSA

What would you like to do?

Home > Flashcards > Print Preview