Online Mind Mapping and Brainstorming

Create your own awesome maps

Online Mind Mapping and Brainstorming

Even on the go

with our free apps for iPhone, iPad and Android

Get Started

Already have an account? Log In

Encryption by Mind Map: Encryption
5.0 stars - 3 reviews range from 0 to 5

Encryption

RC4

Ron Rivest

RSA Security

variable length stream cipher

fast

efficient

most common stream cipher used today

used in:

symmetric encryption algorithm

operate on smaller units of plaintext (bits)

much faster than block ciphers

stream cipher operation

keystream generation can be independent of:

capable of key lengths

considered moderately secure

RC5

Ron Rivest

RSA Security

developed in 1994

block cipher

developed for use in software

extremely efficient on "fast" processors (Pentium and above)

parameterized algorithm

variable

3 routines

exceptionally simple

easy to implement and analyze

July 14, 2002

December 3, 2002

DES

Data Encryption Standard

56-bit

modified version of IBMs Lucifer algorithm (128-bit)

adopted by NIST as federal standard November 23, 1976

specification published in January 1977

quickly became widely-employed

find DES key by brute force

encrypts and decrypts in 64-bit blocks

56-bit not appropriate for high security apps

abandoned by NIST in 1997

began work on replacement - AES

still widely used

3DES

DES developed by IBM around 1974

adopted as national standard in 1977

3DES minor variation of this

3 times slower than DES

far more secure than DES

3 64-bit keys = 192 bit overall length

same procedure as DES but repeated 3 times

procedure

All Keys should be different

8 parity bits for each key = 168 bit effective strength

AES

Advanced Encryption Standard

NIST initiated selection in 1997

symmetric-key encryption

for unclassified Federal information

initial candidates

Selected Rijndael "Rhine-Dahl"

intended to be several orders of magnitude more secure than DES only marginally slower

expected to have a life of 20-30 years

will require new APs and wireless NICs

CPU intensive

included in IEEE 802.11i draft

capable of 128, 192 and 256-bit keys

considered uncrackable