with our free apps for iPhone, iPad and Android

Get StartedAlready have an account? Log In

Encryption
by Michael Qaissaunee
#
Encryption

##
RC4

###
Ron Rivest

###
RSA Security

###
variable length stream cipher

###
fast

###
efficient

###
most common stream cipher used today

###
used in:

###
symmetric encryption algorithm

###
operate on smaller units of plaintext (bits)

###
much faster than block ciphers

###
stream cipher operation

###
keystream generation can be independent of:

###
capable of key lengths

###
considered moderately secure

##
RC5

###
Ron Rivest

###
RSA Security

###
developed in 1994

###
block cipher

###
developed for use in software

###
extremely efficient on "fast" processors (Pentium and above)

###
parameterized algorithm

###
variable

###
3 routines

###
exceptionally simple

###
easy to implement and analyze

###
July 14, 2002

###
December 3, 2002

##
DES

###
Data Encryption Standard

###
56-bit

###
modified version of IBMs Lucifer algorithm (128-bit)

###
adopted by NIST as federal standard November 23, 1976

###
specification published in January 1977

###
quickly became widely-employed

###
find DES key by brute force

###
encrypts and decrypts in 64-bit blocks

###
56-bit not appropriate for high security apps

###
abandoned by NIST in 1997

###
began work on replacement - AES

###
still widely used

##
3DES

###
DES developed by IBM around 1974

###
adopted as national standard in 1977

###
3DES minor variation of this

###
3 times slower than DES

###
far more secure than DES

###
3 64-bit keys = 192 bit overall length

###
same procedure as DES but repeated 3 times

###
procedure

###
All Keys should be different

###
8 parity bits for each key = 168 bit effective strength

##
AES

###
Advanced Encryption Standard

###
NIST initiated selection in 1997

###
symmetric-key encryption

###
for unclassified Federal information

###
initial candidates

###
Selected Rijndael "Rhine-Dahl"

###
intended to be several orders of magnitude more secure than DES only marginally slower

###
expected to have a life of 20-30 years

###
will require new APs and wireless NICs

###
CPU intensive

###
included in IEEE 802.11i draft

###
capable of 128, 192 and 256-bit keys

###
considered uncrackable

5.0 stars - 3 reviews
range from 0 to 5