OBJECTIVE 02 — SYMMETRIC ENCRYPTION ALGORITHMS
SYMMETRIC ENCRYPTION (RECAP – EXAM CONTEXT)
| Property | Description |
|---|---|
| Keys | Same key for encryption and decryption |
| Speed | Very fast |
| Usage | Bulk data encryption |
| Weakness | Key distribution |
MEMORY HOOK:
Same key → speed
CLASSIFICATION OF SYMMETRIC ALGORITHMS
BY DATA HANDLING
| Type | Description |
|---|---|
| Block Cipher | Encrypts fixed-size blocks |
| Stream Cipher | Encrypts bit/byte stream |
BLOCK CIPHERS (VERY HIGH EXAM WEIGHT)
DATA ENCRYPTION STANDARD (DES)
| Property | Value |
|---|---|
| Key size | 56-bit |
| Block size | 64-bit |
| Structure | Feistel |
| Status | Broken / insecure |
LOGIC:
-
Uses substitution and permutation
-
Vulnerable to brute-force attacks
EXAM TRAP:
DES is NOT secure, even if implemented correctly.
MEMORY HOOK:
DES = Dead Encryption Standard
TRIPLE DES (3DES)
| Property | Value |
|---|---|
| Key size | 112 or 168-bit |
| Block size | 64-bit |
| Operation | Encrypt–Decrypt–Encrypt |
| Status | Deprecated but stronger than DES |
LOGIC:
-
Applies DES three times
-
Slower than DES
EXAM TRAP:
3DES ≠ three different algorithms.
MEMORY HOOK:
DES × 3 = slow but safer
ADVANCED ENCRYPTION STANDARD (AES)
MOST IMPORTANT SYMMETRIC ALGORITHM IN CEH
| Property | Value |
|---|---|
| Key sizes | 128, 192, 256-bit |
| Block size | 128-bit |
| Structure | Substitution–Permutation |
| Status | Secure and recommended |
LOGIC:
-
Faster than 3DES
-
Resistant to known attacks
EXAM TRAP:
AES is NOT Feistel-based.
MEMORY HOOK:
AES = gold standard
BLOWFISH
| Property | Value |
|---|---|
| Key size | 32–448-bit |
| Block size | 64-bit |
| Creator | Bruce Schneier |
| Status | Secure but aging |
LOGIC:
-
Fast in software
-
Free and unpatented
MEMORY HOOK:
Blowfish = flexible key size
TWOFISH
| Property | Value |
|---|---|
| Key size | Up to 256-bit |
| Block size | 128-bit |
| Relation | Successor to Blowfish |
| Status | Secure |
EXAM TRAP:
Twofish ≠ Blowfish upgrade inside AES (AES won Rijndael).
MEMORY HOOK:
Twofish = AES finalist
RC (RIVEST CIPHERS) FAMILY
RC2
| Property | Value |
|---|---|
| Key size | Variable |
| Block size | 64-bit |
| Status | Weak |
RC4 (STREAM CIPHER – IMPORTANT)
| Property | Value |
|---|---|
| Type | Stream cipher |
| Key size | 40–2048-bit |
| Usage | SSL, WEP (historically) |
| Status | Broken |
EXAM TRAP:
RC4 vulnerabilities allow keystream reuse attacks.
MEMORY HOOK:
RC4 = Rapidly Cracked
RC5
| Property | Value |
|---|---|
| Block size | Variable |
| Key size | Variable |
| Rounds | Variable |
| Status | Experimental |
RC6
| Property | Value |
|---|---|
| Block size | 128-bit |
| Key size | Up to 256-bit |
| Status | AES finalist |
MEMORY HOOK:
RC6 = AES runner-up
CAST (CARLISLE ADAMS AND STAFFORD TAVARES)
| Property | Value |
|---|---|
| Block size | 64 or 128-bit |
| Key size | Up to 256-bit |
| Usage | PGP |
| Status | Secure |
GOST
| Property | Value |
|---|---|
| Origin | Russia |
| Block size | 64-bit |
| Key size | 256-bit |
| Status | Secure |
MEMORY HOOK:
GOST = Russian crypto
CAMELLIA
| Property | Value |
|---|---|
| Block size | 128-bit |
| Key sizes | 128, 192, 256-bit |
| Status | AES-equivalent |
MEMORY HOOK:
Camellia = AES alternative
CHACHA20 (STREAM CIPHER – MODERN)
| Property | Value |
|---|---|
| Type | Stream cipher |
| Key size | 256-bit |
| Usage | TLS, VPNs |
| Status | Secure |
LOGIC:
-
Faster than AES on mobile devices
-
Resistant to timing attacks
MEMORY HOOK:
ChaCha20 = modern RC4 replacement
BLOCK VS STREAM CIPHER (EXAM FAVORITE)
| Feature | Block | Stream |
|---|---|---|
| Data handling | Fixed blocks | Continuous stream |
| Error impact | Whole block | Single bit |
| Examples | AES, DES | RC4, ChaCha20 |
MODES OF OPERATION (VERY HIGH YIELD)
Block ciphers require modes.
| Mode | Description |
|---|---|
| ECB | Electronic Codebook (INSECURE) |
| CBC | Cipher Block Chaining |
| CFB | Cipher Feedback |
| OFB | Output Feedback |
| CTR | Counter |
| GCM | Galois/Counter Mode |
EXAM TRAP:
ECB reveals patterns.
MEMORY HOOK:
Never use ECB
OBJECTIVE 02 — MEMORY CHECKLIST
You must remember:
-
DES is broken
-
3DES is slow
-
AES is standard
-
RC4 is insecure
-
ChaCha20 replaces RC4
-
Block vs Stream differences
-
ECB mode is insecure
-
AES block size is always 128-bit
STATUS
Objective 02: COMPLETE
Reply next to continue with:
OBJECTIVE 03 — ASYMMETRIC ENCRYPTION ALGORITHMS (RSA, DSA, Diffie-Hellman, ECC, ElGamal)