Specialist Latest 2023 Graded A
DSA ✔✔FIPS 186
AES ✔✔FIPS 197
MD5 ✔✔RFC1321
GOST ✔✔GOST 281747
Block Ciphers ✔✔Examples include: AES, TwoFish, Serpent, Skipjack, DES, 3DES
Stream Ciphers ✔✔Examples include: RC4, FISH, Pike
Hash Functions ✔✔Examples include: MD5, MD6, SHA-1, SHA-2, SHA-3, FORK-256,
RIPEMD-160, GOST, TIGER
,Asymmetric cryptography ✔✔Also called public key cryptography
Symmetric Stream Cipher ✔✔Also called State Ciphers
Symmetric cryptography ✔✔Single private key used to encrypt and decrypt
Random Number Generators ✔✔Table look-up, Hardware, Algorithmic (software)
K1 ✔✔Random numbers with low probability of identical consecutive elements
K2 ✔✔Random numbers indistinguishable from "true random" numbers
K3 ✔✔Impossible for attacker to calculate or guess previous/future number in sequence
K4 ✔✔Impossible for attacker to calculate or guess from inner state of the generator any
previous numbers or previous inner generator states
Crypography ✔✔Study of message security
, Cryptography ✔✔In practice for over 3000 years, mostly by military or governments until the
late 20th century
Plain text ✔✔Unaltered text
Cipher text ✔✔Encrypted text
Mono-Alphabet Substitution ✔✔Examples include: Caesar, Atbash, ROT13
Caesar ✔✔Cipher used by Julius Caesar
Caesar ✔✔Cipher where every letter in message is shifted a fixed x number to the right or left
Mono-Alphabet Substitution ✔✔Type of Algorithm which substitutes 1 character of cipher text
for 1 character of plain text