# Domain 1 - Cryptography (Study)

The flashcards below were created by user mpskeeter on FreezingBlue Flashcards.

1. Symmetric Algorithms
• CAST
• 3DES
• Twofish
• Blowfish
• Rivest Cipher
• AES
• IDEA
• DES
• Skipjack
• SAFER
2. DES
• Symmetric
• Block Cipher
• Block: 64 bits
• Key: 64 bits (56 + 8 parity)
3. 3DES
• Symmetric
• Block Cipher (Used in PGP/GPG)
• Block: 64 bits
• Key: 192 bits (168 + 24 parity)
4. AES
• Symmetric
• Rjindael Block Cipher (Used in PGP/GPG)
• Block: 128 bits
• Key: 128, 192, 256 bits
5. Blowfish
• Symmetric
• Block Cipher
• Block: 64 bits
• Key: variable 32 to 448 bits
6. Twofish
• Symmetric
• Block Cipher (Used in PGP/GPG)
• Block: 128 bits
• Key: 128, 192, 256 bits
7. CAST-128
• Symmetric
• Block Cipher (Used in PGP/GPG)
• Block: 64 bits
• Key: variable 40 to 128
8. CAST-256
• Symmetric
• Block Cipher (Used in PGP/GPG)
• Block: 128 bits
• Key: variable 128, 160, 192, 224, 256
9. RC4
• Symmetric
• Stream Cipher (Used in WEP) (Wireless)
• Stream:
• Key: variable 40-2048 bits
10. RC5
• Symmetric
• Block Cipher
• Block: 32, 64, 128 bits
• Key: variable 0 to 2048 bits
11. RC6
• Symmetric
• Block Cipher
• Block: 128 bits
• Key: variable 0 to 2048 (includes integer multiple and four 4-bit registers, instead of two)
12. IDEA
• Symmetric
• Block Cipher (Used in PGP/GPG)
• Block: 64 bits
• Key: 128 bits
13. SAFER+
• Symmetric
• Block Cipher (bluetooth)
• Block: 128 bits
• Key: 128, 192, 256 bits
14. SAFER++
• Symmetric
• Block Cipher (bluetooth)
• Block: 64, 128 bits
• Key: 64, 128 bits
15. Asymetric Algorithms
• Diffie-Hellman
• Elliptiv Curve Cryptography (ECC)
• El Gamal
• RSA
16. RSA
• Asymmetric
• Key Exchange, Encryption, Digital Signatures (Used in PGP/GPG)
• Large Prime Numbers; based on difficulty of factoring N
• Key: 512 bit to arbitrarily long (1024-2048 considered safe)
17. Diffie-Hellman
• Asymmetric
• Key Exchange (Used in PGP/GPG)
• Discrete logarithms
• Key: 512 bit to arbitrarily long (1024-2048 considered safe)
18. El Gamal
• Asymmetric
• Key Exchange, Encryption, Digital Signatures
• Discrete Logarithms; very slow when used to create digital signatures
• Key: 256 bit to arbitrarily long (1024-2048 considered safe)
19. ECC
• Asymmetric
• Key Exchange, Encryption, Digital Signatures (used in cell phones and wireless devices)
• Based on points on an elliptic curve
20. Hashing Algorithms
• MD4
• MD5
• SHA (SHA-1)
• SHA-2
• SHA-3
• RIPEMD
• RIPEMD-160
• HAVAL
• Whirlpool
21. HMAC
• Hash
• Variable
22. MD5
• Hash
• 512 bit block processing
• 128 bit digest
23. SHA-1
• Hash
• (Used in PGP/GPG)
• 512 bit processing
• 160 bit digest
24. Ports
• 20 FTP-DATA
• 21 FTP-CONTROL
• 22 SSH
• 23 TELNET
• 25 SMTP
• 49 TACACS+
• 67 DHCP/TCP
• 68 DHCP/UDP
• 80 HTTP
• 110 POP3
• 119 NNTP
• 115 SFTP
• 123 NTP
• 137 NetBIOS-NAME
• 138 NetBIOS-DATAGRAM
• 139 NetBIOS-SESSION
• 143 IMAP
• 161 SNMP
• 162 SNMP-TRAP
• 389 LDAP
• 443 HTTPS
• 465 SMTP/TLS
• 636 SLDAP
• 1433 MSSQL
• 1434 MSSQL
• 1701 L2TP, L2P
• 1723 PPTP
• 3389 RDP
25. DNS Records
• A - IPV4
• AAAA - IPV6
• CRT - Certificate
• MX - Mail Exchange
• NS - NameServer
• TXT - Text
• CNAM - Cannonical Name
• SOA
26. Whirlpool
• Hash
• 512 bit processing
• 512 bit digest
 Author: mpskeeter ID: 310818 Card Set: Domain 1 - Cryptography (Study) Updated: 2015-11-05 03:28:56 Tags: Security Cryptography Study Folders: Security+ Description: Security+ Domain 1 - Cryptography (Study) Show Answers: